US20120057708A1 - Computer-readable, non-transitory medium storing digital content distributing program, computer-readable, non-transitory medium storing digital content playback program, digital content distributing apparatus and digital content playback apparatus - Google Patents
Computer-readable, non-transitory medium storing digital content distributing program, computer-readable, non-transitory medium storing digital content playback program, digital content distributing apparatus and digital content playback apparatus Download PDFInfo
- Publication number
- US20120057708A1 US20120057708A1 US13/041,321 US201113041321A US2012057708A1 US 20120057708 A1 US20120057708 A1 US 20120057708A1 US 201113041321 A US201113041321 A US 201113041321A US 2012057708 A1 US2012057708 A1 US 2012057708A1
- Authority
- US
- United States
- Prior art keywords
- data
- separation
- content
- content key
- separated
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4623—Processing of entitlement messages, e.g. ECM [Entitlement Control Message] or EMM [Entitlement Management Message]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/63—Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
- H04N21/631—Multimode Transmission, e.g. transmitting basic layers and enhancement layers of the content over different transmission paths or transmitting with different error corrections, different keys or with different transmission protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/63—Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
- H04N21/633—Control signals issued by server directed to the network components or client
- H04N21/6332—Control signals issued by server directed to the network components or client directed to client
- H04N21/6334—Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
- H04N21/63345—Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key by transmitting keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/65—Transmission of management data between client and server
- H04N21/658—Transmission by the client directed to the server
- H04N21/6581—Reference data, e.g. a movie identifier for ordering a movie or a product identifier in a home shopping application
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/845—Structuring of content, e.g. decomposing content into time segments
- H04N21/8455—Structuring of content, e.g. decomposing content into time segments involving pointers to the content, e.g. pointers to the I-frames of the video stream
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/845—Structuring of content, e.g. decomposing content into time segments
- H04N21/8456—Structuring of content, e.g. decomposing content into time segments by decomposing the content in the time domain, e.g. in time segments
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/85—Assembly of content; Generation of multimedia applications
- H04N21/854—Content authoring
- H04N21/85406—Content authoring involving a specific file format, e.g. MP4 format
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/603—Digital right managament [DRM]
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Databases & Information Systems (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Storage Device Security (AREA)
Abstract
In digital content including; data in which digital copyrighted work is stored, and a plurality of separation data separated from the data, a header of the data stores position information for specifying a separation region in which one of the separation data is separated. Moreover each separation region in which the separation data is separated, stores position information for specifying other separation regions in an interlinked manner. Furthermore the data excluding the separation region is encrypted by a content key of the data, and the separation region of the data, and the separation data are encrypted respectively by a content key different for each separation data. Moreover, the separation data is distributed together with the content key on a route different to the data.
Description
- This application is based upon and claims the benefit of priority of the prior Japanese Patent Application No. 2010-067465, filed on Mar. 24, 2010, the entire contents of which are incorporated herein by reference.
- The embodiment discussed herein is related to a technique for distributing or playing back digital data.
- In the case where encrypted digital content is stored on various recording media and circulated, or is circulated via a network, the digital content is exposed to an attack of estimating a content key for decrypting the digital content. Therefore, a technique has been proposed where a part of the digital content is separated from a digital content body and distributed together with a license, to thereby protect the digital content.
- However, in the conventional technique, because there is only one separation data separated from the digital content body, the proportion of a region which cannot be used in the digital content body has been small. Therefore, if a third person who has acquired the digital content body can estimate the content key of the digital content body, he/she may be able to use the digital content to some extent, even in a state where the separation data cannot be used.
- According to an aspect of the embodiment, the digital content includes; data in which digital copyrighted work is stored, and a plurality of separation data separated from the data. The data has a header, which stores position information for specifying a separation region in which one of the separation data is separated, and the each separation region in which the separation data is separated, stores position information for specifying other separation regions in an interlinked manner. Moreover, the data excluding the separation data is encrypted by a content key of the data, while the separation region of the data and the separation data separated from the separation region are encrypted respectively by a content key different for each separation data.
- Moreover a server that distributes the digital content responds to a request of a content key of the data to send the content key of the data and an identifier for identifying the separation data separated from the separation region specified by the position information stored in the header of the data. Furthermore the server also responds to a distribution request of separation data, to send the separation data, the content key of the separation data, and an identifier for identifying the separation data separated from the separation region specified by the position information stored in the separation region in which the separation data is separated.
- On the other hand, a client who plays back the digital content, requests a distribution of the content key of the data, when playback of the data is started. Moreover, a client having received the content key of the data and the identifier for identifying the separation data separated from the separation region specified by the position information stored in the header of the data, requests a distribution of the separation data specified by the identifier. Furthermore, the client having received the separation data, the content key of the separation data, and the identifier for identifying the separation data separated from the separation region specified by the position information stored in the separation region in which the separation data is separated, requests a distribution of the separation data specified by the identifier. Thereafter, the client decrypts the data excluding the separation region by using the content key of the data, and decrypts the separation region of the data and the separation data by using the content key of the separation data. Moreover, the client plays back the data and the separation data based on the separation region specified by the position information stored in the header of the data and in the separation region.
- The object and advantages of the embodiment will be realized and attained by means of the elements and combinations particularly pointed out in the claims.
- It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory and are not restrictive of the embodiment, as claimed.
-
FIG. 1 is a schematic diagram illustrating one example of a computer system to which the present technique is applied; -
FIG. 2 is a diagram for explaining a data structure of a digital content; -
FIG. 3 is a diagram for explaining content information; -
FIG. 4 is a diagram for explaining an expiration list; -
FIG. 5 is a flowchart illustrating a content generating process; -
FIG. 6 is a diagram for explaining content generating information; -
FIG. 7 is a flowchart illustrating a content distributing process; -
FIG. 8 is a flowchart illustrating a content information acquiring process; -
FIG. 9 is a flowchart illustrating a position information expanding process; -
FIG. 10 is a diagram for explaining a position information list; -
FIG. 11 is a flowchart illustrating a decrypting process; -
FIG. 12 is a flowchart illustrating a content playback process; -
FIG. 13 is a diagram for explaining a specific example of data to be processed; -
FIG. 14 is a diagram for explaining a specific example of the content generating information; -
FIG. 15 is a diagram for explaining a specific example of a digital content generating method; -
FIG. 16 is a diagram for explaining a specific example of content information of the data; -
FIG. 17 is a diagram for explaining a specific example of content information of one separation data; -
FIG. 18 is a diagram for explaining a specific example of content information of another separation data; -
FIG. 19 is a diagram for explaining a digital content generating process; and -
FIG. 20 is a diagram for explaining processes from distribution to playback of the digital content. -
FIG. 1 is a schematic diagram illustrating one example of a computer system to which the present technique is applied. - A
server 100 that generates and distributes digital content, is connected to at least oneclient 300 that plays back the digital content, via a network such as a local area network (LAN). Theserver 100 and theclient 300 have a digital right management (DRM), which is an example of a technique for achieving copyright protection of digital contents, and intercommunicate with each other by using a secure protocol. Moreover theserver 100 and theclient 300 include tamper resistance so that the DRM and data cannot be easily analyzed from outside. - The
server 100 executes a digital content distributing program stored in astorage 110 such as a hard disk to realize a content generatingunit 120 and a transmittingunit 130, respectively. The digital content distributing program is installed on thestorage 110 from a computer-readable, non-transitory medium such as a compact disk read only memory (CD-ROM) or a digital versatile disk read only memory (DVD-ROM) by using a well-known setup program or the like. - The content generating
unit 120 responds to an instruction from a user to generate a digital content to be distributed, and registers the digital content in thestorage 110. The transmittingunit 130, in response to a content distribution request from theclient 300, distributes the digital content registered in thestorage 110. - Here, a data structure of a digital content to be distributed is explained.
- As illustrated in
FIG. 2 , adigital content 400 includes; data (body data) 410 in which a digital copyrighted work such as a movie is stored, and a plurality ofseparation data 420 separated from thedata 410. In aheader 410A of thedata 410 is set position information (for example, start position and size) for specifying aseparation region 410B (separation region 1) in which one piece ofseparation data 420, for example, the top separation data 420 (separation data 1) is separated from thedata 410. Moreover in theseparation region 410B in which each piece ofseparation data 420 is separated from thedata 410 is set position information for specifying theseparation region 410B in an interlinked manner in which thenext separation data 420 is separated, and arbitrary random data (dummy data). In the position information of the last separation region 4108 (separation region N) of thedata 410 is set information indicating that there is nonext separation data 420, for example, “size=0”. Thedata 410 and theseparation data 420 are respectively encrypted by a corresponding content key. - In the
storage 110,content information 500 illustrated inFIG. 3 and anexpiration list 600 illustrated inFIG. 4 are respectively stored. - The
content information 500 includes; a content key identifier of the data or the separation data, a content key of the data or the separation data, a content key identifier of the next separation data, content key source information of the next separation data, and the separation data which is encrypted (encrypted separation data). Here, the content key source information is formed of a character string indicating, for example, a uniform resource locator (URL) and IP address+port number. Moreover thecontent information 500 related to the data does not include encrypted separation data. Theexpiration list 600 is for specifying the separation data to expire, and includes; publisher name, number of separation data to expire, content key identifier of the separation data to expire, and digital signature with a route public key certificate. Theexpiration list 600 is generated and edited by a tool with which a user inputs and edits; publisher name, number of separation data to expire, content key identifier, and digital signature via, for example, a graphical user interface (GUI). The content key identifier of the separation data is also used for identifying the separation data. - On the other hand, the
client 300 executes a digital content playback program stored in astorage 310 such a hard disk to realize a contentinformation acquiring unit 320, a positioninformation expanding unit 330, adecrypting unit 340, and acontent playback unit 350, respectively. The digital content playback program is installed on thestorage 310 from a computer-readable, non-transitory medium such as the CD-ROM or DVD-ROM by using a well-known setup program or the like. - The content
information acquiring unit 320 acquirescontent information 500 of thedata 410,content information 500 of theseparation data 420, and theexpiration list 600 from theserver 100 at the time of playback thedata 410 distributed by superdistribution or the like. The positioninformation expanding unit 330 decrypts theheader 410A of thedata 410 and the respective separation regions 4108 by using the content keys of thedata 410 and theseparation data 420, respectively, thereby expanding pieces of position information of the respective separation regions 4108 in thedata 410. The decryptingunit 340 decrypts thedata 410 and theseparation data 420 by using the content keys of thedata 410 and theseparation data 420, respectively. Thecontent playback unit 350 refers to the position information of the respective separation regions 4108 expanded by the decryptingunit 340 to playback the decrypteddata 410 andseparation data 420. The contentinformation acquiring unit 320, the positioninformation expanding unit 330, the decryptingunit 340, and thecontent playback unit 350 can be performed by large scale integration (LSI) implementing the DRM. -
FIG. 5 illustrates a content generating process executed by thecontent generating unit 120 in theserver 100, when a user specifies a digital content to be processed, and inputscontent generating information 700 illustrated inFIG. 6 . Here as illustrated inFIG. 6 , thecontent generating information 700 includes the number of separation data to be separated from thedata 410, and a plurality of pieces of separation data information. The separation data information includes; the content key identifier, the content key source information, and position information (for example, start position and size) for specifying the separation region 4108 of thedata 410. Thecontent generating information 700 is generated by a tool, with which the user specifies the number of separation data and the separation data information, for example, via the GUI. Thecontent generating information 700 may be specified by a character-based user interface (CUI). The number of separation data set in thecontent generating information 700 can be appropriately determined, taking into consideration the balance between playback efficiency and security strength of thedigital content 400 in theclient 300. This is because playback efficiency decreases if the number of separation data is too large, and the security strength decreases if the number of separation data is too small. - In step 1 (abbreviated as “S1” in the drawings, and similarly hereunder), the
content generating unit 120 determines whether there is an unprocessed separation region in thedata 410, for example, by determining whether theseparation data 420 has been separated corresponding to the number of separation data set in thecontent generating information 700. Then if thecontent generating unit 120 determines that there is an unprocessed separation region, the processing proceeds to step 2 (Yes), while if determined that there is no unprocessed separation region, the processing proceeds to step 10 (No). - In
step 2, thecontent generating unit 120 sequentially selects the separation data information from thecontent generating information 700. - In
step 3, thecontent generating unit 120 determines whether theseparation data 420 specified by the content key identifier is unregistered, by determining whether the content key identifier of the separation data information is registered in thecontent information 500 in thestorage 110. Then if thecontent generating unit 120 determines that theseparation data 420 is unregistered, the processing proceeds to step 4 (Yes), while if determined that theseparation data 420 has been registered, the processing proceeds to step 9 (No). - In
step 4, thecontent generating unit 120 determines whether the separation region specified by the user is appropriate, by determining whether the separation region specified by the position information of the separation data information is included in thedata 410. Then if thecontent generating unit 120 determines that the separation region is appropriate, the processing proceeds to step 5 (Yes), while if determined that the separation region is not appropriate, the processing proceeds to step 9 (No). - In
step 5, thecontent generating unit 120 generates a content key for encrypting theseparation data 420 by using, for example, one function of the DRM. - In step 6, the
content generating unit 120 separates theseparation data 420 from the separation region 4108 of thedata 410 specified by the position information of the separation data information, and encrypts theseparation data 420 by using the content key generated instep 5. - In step 7, the
content generating unit 120 registers thecontent information 500 related to theseparation data 420 in thestorage 110. That is, thecontent generating unit 120 refers to thecontent generating information 700 and generates thecontent information 500 in which the content key identifier and the content key of theseparation data 420, the content key identifier and the content key source information of thenext separation data 420, and theencrypted separation data 420 are associated with each other. Then thecontent generating unit 120 registers the generatedcontent information 500 in thestorage 110. - In step 8, the
content generating unit 120 refers to thecontent generating information 700, and sets the position information and random data of the next separation data in theseparation region 410B in which theseparation data 420 is separated from thedata 410. Then thecontent generating unit 120 encrypts theseparation region 410B of thedata 410 by using the content key generated instep 5, and then the processing returns to step 1. - In step 9, the
content generating unit 120 displays information indicating that thecontent generating information 700 is not appropriate, for example, on a display device. - In
step 10, thecontent generating unit 120 refers to thecontent generating information 700, and sets the position information of thetop separation data 420 in theheader 410A of thedata 410. - In
step 11, thecontent generating unit 120 generates the content key for encrypting thedata 410 by using, for example, one function of the DRM. - In
step 12, thecontent generating unit 120 encrypts a part at least excluding the respective separable regions 4108 of thedata 410 by using the content key generated instep 11. - In
step 13, thecontent generating unit 120 registers thedata 410 and thecontent information 500 related to thedata 410 in thestorage 110. That is, thecontent generating unit 120 refers to thecontent generating information 700, and generates the content key identifier and the content key of thedata 410, and thecontent information 500 in which the content key identifier of thetop separation data 420 and the content key source information are associated with each other. Then thecontent generating unit 120 registers the generatedcontent information 500 in thestorage 110. - According to the content generating process, in the
server 100, when a digital content to be processed and a generating method are specified, theseparation data 420 is separated from the plurality of separation regions 4108 of thedata 410 and encrypted. On the other hand, position information for specifying theseparation region 410B in which thetop separation data 420 is separated, is set in theheader 410A of thedata 410, and position information for specifying theseparation region 410B in which thenext separation data 420 is separated, is set in the respective separable regions 4108 of thedata 410. At this time, theheader 410A is encrypted by the content key of thedata 410. Moreover therespective separation regions 410B are encrypted by the content key of thecorresponding separation data 420. - Therefore, even if the content key of the
data 410 distributed by superdistribution or the like is estimated, if the content key of eachseparation data 420 cannot be estimated, the position at which theseparation data 420 is separated cannot be specified. Moreover, even if the content key of theseparation data 420 can be estimated, the position at which theseparation data 420 is separated cannot be specified, unless therespective separation regions 410B are sequentially tracked from theheader 410A of thedata 410. Accordingly, even if all the content keys of thedigital content 400 are estimated, thedigital content 400 cannot be reconstructed, unless the content keys are estimated in a specified order, thereby enabling to protect thedigital content 400. -
FIG. 7 illustrates a content distributing process executed by the transmittingunit 130 in theserver 100, when theclient 300 sends a distribution request of thecontent information 500. - In
step 21, the transmittingunit 130 determines whether thecontent information 500 associated with the distribution request has been registered, for example, by determining whether thecontent information 500 having the content key identifier included in the distribution request has been registered in thestorage 110. Then if the transmittingunit 130 determines that thecontent information 500 has been registered, the processing proceeds to step 22 (Yes), while if determined that thecontent information 500 has not been registered, the processing proceeds to step 26 (No). - In
step 22, the transmittingunit 130 determines whether the distribution request is associated with thedata 410, for example, by determining whether there is the encrypted separation data in thecontent information 500 associated with the distribution request. Then if the transmittingunit 130 determines that the distribution request is associated with thedata 410, the processing proceeds to step 23 (Yes), while if determined that the distribution request is not associated with thedata 410, that is, the distribution request is associated with theseparation data 420, the processing proceeds to step 24 (No). - In step 23, the transmitting
unit 130 sends thecontent information 500 specified by the content key identifier included in the distribution request, that is, thecontent information 500 of thedata 410. - In
step 24, the transmittingunit 130 determines whether theseparation data 420 is the data to expire, by determining whether the content key identifier included in the distribution request, that is, the content key identifier of theseparation data 420 has been registered in theexpiration list 600 in thestorage 110. Then if the transmittingunit 130 determines that theseparation data 420 is not the data to expire, the processing proceeds to step 25 (Yes), while if determined that theseparation data 420 is the data to expire, the processing proceeds to step 26 (No). - In step 25, the transmitting
unit 130 sends thecontent information 500 specified by the content key identifier included in the distribution request, and theexpiration list 600. - In
step 26, because thecontent information 500 associated with the distribution request is unregistered or it is theseparation data 420 to expire, the transmittingunit 130 sends an error message. - According to the content distributing process, in the
server 100, when theclient 300 sends a distribution request, it is determined whether the distribution request is associated with thedata 410, by determining whether there is the encrypted separation data in thecontent information 500 specified by the content key identifier. Then if the distribution request is associated with thedata 410, thecontent information 500 of thedata 410 is sent, while if the distribution request is associated with theseparation data 420, thecontent information 500 of theseparation data 420, and theexpiration list 600 are sent. - Therefore, the
client 300 can use the sentcontent information 500 to reconstruct thedigital content 400 including thedata 410 and theseparation data 420. Moreover because theexpiration list 600 is sent in addition to thecontent information 500 of theseparation data 420, theexpiration list 600 defining theseparation data 420 to expire can be updated to the latest one. -
FIG. 8 illustrates the content information acquiring process executed by the contentinformation acquiring unit 320, when playback of thedata 410 is started in theclient 300. The content key identifier and the content key source information of thedata 410 are acquired as meta-information included in the license, for example, at the time of purchasing the license of thedigital content 400 online. - In
step 31, the contentinformation acquiring unit 320 requests theserver 100 specified by the content key source information included in the meta-information to transmit thecontent information 500 of thedata 410 specified by the content key identifier. - In
step 32, the contentinformation acquiring unit 320 determines whether there is a response from theserver 100, that is, whether thecontent information 500 of thedata 410 has been received. Then if there is a response from theserver 100, the processing proceeds to step 33 (Yes), while if there is no response from theserver 100, the contentinformation acquiring unit 320 repeats a reception determining process (No). When theserver 100 sends an error message, the contentinformation acquiring unit 320 displays a message on the display device indicating for example that thedigital content 400 cannot be played back, after which playback of thedata 410 is suspended (similarly hereunder). - In
step 33, the contentinformation acquiring unit 320 registers thecontent information 500 of thedata 410 in thestorage 310. - In step 34, the content
information acquiring unit 320 determines whether there is thenext separation data 420, for example, based on the content key identifier of the next separation data in thecontent information 500. Then if the contentinformation acquiring unit 320 determines that there is thenext separation data 420, the processing proceeds to step 35 (Yes), while if determined that there is nonext separation data 420, the processing proceeds to step 38 (No). - In step 35, the content
information acquiring unit 320 requests theserver 100 specified by the content key source information of the next separation data in the receivedcontent information 500 to transmit thecontent information 500 of theseparation data 420 specified by the content key identifier. - In step 36, the content
information acquiring unit 320 determines whether there is a response from theserver 100, that is, whether thecontent information 500 of theseparation data 420 and theexpiration list 600 have been received. Then if there is a response from theserver 100, the processing proceeds to step 37 (Yes), while if there is no response from theserver 100, the contentinformation acquiring unit 320 repeats the reception determining process (No). - In
step 37, the contentinformation acquiring unit 320 registers thecontent information 500 of theseparation data 420, and theexpiration list 600 in thestorage 310. Thereafter the contentinformation acquiring unit 320 returns the processing to step 34. - In step 38, the content
information acquiring unit 320 notifies the positioninformation expanding unit 330 to start the position information expanding process. - According to the content information acquiring process, when the
client 300 starts playback of thedata 410, theserver 100 specified by the meta-information is requested to transmit thecontent information 500 of thedata 410. Then thecontent information 500 of thedata 410 received from theserver 100 is registered in thestorage 310, and theserver 100 specified by thecontent information 500 is requested to transmit thecontent information 500 of thetop separation data 420. Then thecontent information 500 of theseparation data 420 received from theserver 100 is registered in thestorage 310. Thereafter, pieces ofcontent information 500 of theseparation data 420 are sequentially requested until there is nonext separation data 420 specified by thecontent information 500, and various data required for playing back thedigital content 400 are acquired collectively. -
FIG. 9 illustrates the position information expanding process executed by the positioninformation expanding unit 330 when theclient 300 receives a notification from the contentinformation acquiring unit 320. - In
step 41, the positioninformation expanding unit 330 reads thecontent information 500 of thedata 410 specified by the content key identifier included in the meta-information, from thestorage 310. - In
step 42, the positioninformation expanding unit 330 decrypts theheader 410A of thedata 410 by using the content key of thecontent information 500. - In
step 43, the positioninformation expanding unit 330 stores the position information of the top separation data set in theheader 410A of thedata 410 in a volatile memory such as a random access memory (RAM) as aposition information list 800 having a data structure as illustrated inFIG. 10 . Theposition information list 800 includes the number of separation data, the content key identifier of each separation data, and position information of each separation data. At this time, the positioninformation expanding unit 330 increments the number of separation data and stores the content key identifier of the top separation data in the memory, in addition to the position information of the top separation data. - In step 44, the position
information expanding unit 330 determines whether there is thenext separation data 420, for example, based on the content key identifier of the next separation data of thecontent information 500. Then if the positioninformation expanding unit 330 determines that there is thenext separation data 420, the processing proceeds to step 45 (Yes), while if determined that there is nonext separation data 420, the processing proceeds to step 49 (No). - In
step 45, the positioninformation expanding unit 330 reads thecontent information 500 of theseparation data 420 specified by the content key identifier of the next separation data of thecontent information 500, from thestorage 310. - In
step 46, the positioninformation expanding unit 330 determines whether theseparation data 420 is the data to expire, by determining whether the content key identifier of thecontent information 500 of theseparation data 420 has been registered in theexpiration list 600 in thestorage 310. Then if the positioninformation expanding unit 330 determines that theseparation data 420 is not the data to expire, the processing proceeds to step 47 (Yes), while if determined that theseparation data 420 is the data to expire, the processing proceeds to step 50 (No). - In
step 47, the positioninformation expanding unit 330 decrypts theseparation region 410B of thedata 410 specified by the position information of the separation data stored last in theposition information list 800, by using the content key of thecontent information 500 read instep 45. - In
step 48, the positioninformation expanding unit 330 stores the position information of the next separation data set in theseparation region 410B decrypted instep 47 in the memory as theposition information list 800. At this time, the positioninformation expanding unit 330 increments the number of separation data and stores the content key identifier of the next separation data in the memory, in addition to the position information of the next separation data. Thereafter, the positioninformation expanding unit 330 returns the processing to step 44. - In
step 49, because all the pieces of position information of theseparation data 420 are expanded, the positioninformation expanding unit 330 notifies thedecrypting unit 340 that the decrypting process should be started. - In
step 50, because theseparation data 420 to be processed has been expired, the positioninformation expanding unit 330 deletes thecontent information 500 associated with the expiredseparation data 420 from thestorage 310. - In
step 51, the positioninformation expanding unit 330 displays on the display device, for example, information indicating that thedigital content 400 cannot be played back. - According to the position information expanding process, the
header 410A of thedata 410 is decrypted by using the content key specified by the content key identifier included in the meta-information, and the position information of the top separation data set in theheader 410A is stored in the memory. Next thenext separation region 410B of thedata 410 is decrypted by using the content key specified by the content key identifier of the next separation data in thecontent information 500 associated with theseparation data 420, and the position information of the next separation data set in theseparation region 410B is stored in the memory. Then the process is sequentially performed to expand all the pieces of position information of theseparation data 420 on the memory. -
FIG. 11 illustrates the decrypting process executed by the decryptingunit 340 when theclient 300 receives a notification from the positioninformation expanding unit 330. - In
step 61, the decryptingunit 340 determines whether there isunprocessed separation data 420, for example, by determining whether theseparation data 420 has been decrypted for the number ofseparation data 420 set in theposition information list 800. Then if thedecrypting unit 340 determines that there is theunprocessed separation data 420, the processing proceeds to step 62 (Yes), while if determined that there is nounprocessed separation data 420, the processing proceeds to step 66 (No). - In step 62, the decrypting
unit 340 sequentially selects the content key identifier and the position information of eachseparation data 420 from theposition information list 800. - In step 63, the decrypting
unit 340 determines whether theseparation region 410B in which theseparation data 420 is separated is appropriate, by determining whether theseparation region 410B specified by the position information of theseparation data 420 is included in thedata 410. Then if thedecrypting unit 340 determines that theseparation region 410B is appropriate, the processing proceeds to step 64 (Yes), while if determined that the separation region 4108 is not appropriate, the processing is terminated (No). - In step 64, the decrypting
unit 340 determines whether thecontent information 500 of theseparation data 420 has been registered, by determining whether the content key identifier of theseparation data 420 has been registered in thecontent information 500 in thestorage 310. Then if thedecrypting unit 340 determines that thecontent information 500 of theseparation data 420 has been registered, the processing proceeds to step 65 (Yes), while if determined that thecontent information 500 of theseparation data 420 has not been registered, the processing is terminated (No). - In
step 65, the decryptingunit 340 decrypts theseparation data 420 specified by the content key identifier by using the content key of thecontent information 500. Thereafter, the decryptingunit 340 returns the processing to step 61. - In step 66, because all the
separation data 420 are decrypted, the decryptingunit 340 decrypts thedata 410 by using the content key specified by the content key identifier included in the meta-information. - In
step 67, the decryptingunit 340 notifies thecontent playback unit 350 that thedigital content 400 should be played back. - According to the decrypting process, while determining whether the
separation region 410B corresponding to eachseparation data 420 is appropriate by using theposition information list 800 created by the positioninformation expanding unit 330, eachseparation data 420 is decrypted. Moreover when decrypting of all theseparation data 420 is completed, thedata 410 is decrypted. -
FIG. 12 illustrates a content playback process executed by thecontent playback unit 350 when theclient 300 receives a notification from the decryptingunit 340. In the case where thedigital content 400 is a video picture, a playback result of thedata 410 and theseparation data 420 is output to the display device. - In step 71, the
content playback unit 350 starts playback of thedata 410. - In
step 72, thecontent playback unit 350 refers to theposition information list 800 expanded on the memory to determine whether the playback position is in theseparation region 410B of thedata 410. Then if thecontent playback unit 350 determines that the playback position is in the separation region 4108, the processing proceeds to step 73 (Yes), while if determined that the playback position is not in theseparation region 410B, the processing proceeds to step 76 (No). - In
step 73, thecontent playback unit 350 suspends playback of thedata 410. - In
step 74, thecontent playback unit 350 plays back theseparation data 420 corresponding to the playback position. - In step 75, the
content playback unit 350 restarts playback of thedata 410 from the next position in theseparation region 410B. - In step 76, the
content playback unit 350 determines whether thedata 410 have been played back to the end. Then if determined that thedata 410 have been played back to the end, thecontent playback unit 350 terminates the process (Yes), while if determined that thedata 410 have not been played back to the end, the processing is returned to step 72 (No). - According to the content playback process, after playback of the
data 410 is started, when the playback position reaches theseparation region 410B, playback of thedata 410 is temporarily suspended, and theseparation data 420 corresponding to the separation region 4108 is played back. Therefore, the user of thedigital content 400 can use thedistal content 400 without noticing that thedata 410 and theseparation data 420 are separated from each other. - Accordingly, because various data required for playback is prepared beforehand, before the
digital content 400 is actually played back, theclient 300 can playback thedigital content 400 without a pause. Therefore, even if thedata 410 and the plurality ofseparation data 420 of thedigital content 400 are distributed on separate routes, there is no problem in playback. - Moreover even after the
separation data 420 is distributed to theclient 300, theexpiration list 600 is distributed from theserver 100 to theclient 300 at the time of distributing theseparation data 420. Therefore, the distributedseparation data 420 can be invalidated and deleted. As a result, thedigital content 400 can be protected further. - Next, in order to facilitate understanding of the present technique, processes from generation to playback of the
digital content 400 will be explained, assuming a specific example. In the explanation below, in order to clarify an association among the data or separation data, the content key, and the separation region, interrelated elements are denoted by the same reference symbols. - A case is assumed where in the
server 100,data 1 of a digital content to be processed as illustrated inFIG. 13 is specified, andcontent generating information 700 as illustrated inFIG. 14 is input. Here it is assumed that thedata 1 of the digital content to be processed has a data structure in which packets including a 4-byte header and a 184-byte payload are consecutive, andseparation data packets - As illustrated in
FIG. 15 , when the generating process is started, the position information of theseparation data 11 set in thecontent generating information 700 is encrypted by using the content key of thedata 1, and added to the top of thedata 1 as a header. Furthermore the payload of packet 0 in which a part of the digital copyrighted work associated with thedata 1 is stored is encrypted by using the content key of thedata 1. Moreover, the payload ofpacket 1 in which theseparation data 11 is stored is encrypted by using the content key of theseparation data 11, andcontent information 500 of theseparation data 11 is generated based on the separation data information set in thecontent generating information 700. Next the position information and random data of theseparation data 12 set in thecontent generating information 700 is encrypted by using the content key of theseparation data 11, and stored in the payload ofpacket 1 in which theseparation data 11 has been stored. Then by repeating the same processes frompacket 2 to packet N,data 1 and thecontent information 500 of thedata 1 and theseparation data FIG. 16 toFIG. 18 are respectively generated. - When the process has finished up to packet N of the
data 1, thecontent information 500 of thedata 1 is generated based on the separation data information set in thecontent generating information 700. Here because there is no next separation data of theseparation data 12, then as illustrated inFIG. 18 , for example, NULL is set in the content key identifier and the content key source information of the next separation data in thecontent information 500 of theseparation data 12. - In the generating process, essentially as illustrated in
FIG. 19 , thecontent information 500 in which theseparation data 11 of thedata 1 is encrypted is generated by using acontent key 11 of theseparation data 11. Moreover, thecontent information 500 in which theseparation data 12 of thedata 1 is encrypted is generated by using acontent key 12 of theseparation data 12. Furthermore, the header of thedata 1 and a part of thedata 1 in which the digital copyrighted work is stored are encrypted by using acontent key 1 of thedata 1, andseparation regions data 1 are respectively encrypted by using thecontent keys encrypted data 1 is stored in a recording medium such as a CD-ROM or DVD-ROM, and distributed to a market by for example superdistribution. - (1) Content Information Acquiring Process of Content
Information Acquiring Unit 320 - When the
client 300 starts playback of thedata 1, then as illustrated inFIG. 20 , theserver 100 specified by the meta-information is requested to transmit thecontent information 500 of thedata 1 specified by the meta-information. When theserver 100 sends thecontent information 500 of thedata 1, theserver 100 specified by the content key source information of theseparation data 11 is requested to transmit thecontent information 500 of theseparation data 11 specified by the content key identifier. When theserver 100 sends thecontent information 500 of theseparation data 11, theserver 100 specified by the content key source information of theseparation data 12 is requested to transmit thecontent information 500 of theseparation data 12 specified by the content key identifier. When theserver 100 sends thecontent information 500 of theseparation data 12, because the content key identifier of the next separation data is “NULL”, it is determined that various data required for playing back thedata 1 has been acquired. - (2) Position Information Expanding Process of Position
Information Expanding Unit 330 - The header of the
data 1 is decrypted by using thecontent key 1 of thedata 1, and the position information of theseparation data 11 is expanded on the memory. Furthermore theseparation region 11 of thedata 1 specified by the position information of theseparation data 11 is decrypted by using thecontent key 11 of theseparation data 11, and the position information of theseparation data 12 is expanded on the memory. Moreover, theseparation region 12 of thedata 1 specified by the position information of theseparation data 12 is decrypted by using the content key of theseparation data 12, and it is determined that there is no next separation data. - (3) Decrypting Process of
Decrypting Unit 340 - Data A and B in which digital copyrighted work is stored in the
data 1 are decrypted by using thecontent key 1 of thedata 1. Moreover, theseparation data 11 included in thecontent information 500 of theseparation data 11 is decrypted by using thecontent key 11 of theseparation data 11, and theseparation data 12 included in the content information of theseparation data 12 is decrypted by using thecontent key 12 of theseparation data 12. - (4) Content Playback Process Performed by
Content Playback Unit 350 - The decrypted data A,
separation data 11, data B, andseparation data 12 are played back in this order by using the position information of theseparation data - All examples and conditional language recited herein are intended for pedagogical purposes to aid the reader in understanding the invention and the concepts contributed by the inventor to furthering the art, and are to be construed as being without limitation to such specifically recited examples and conditions, nor does the organization of such examples in the specification relate to a showing of the superiority and inferiority of the invention. Although the embodiment of the present invention has been described in detail, it should be understood that the various changes, substitutions, and alterations could be made hereto without departing from the spirit and scope of the invention.
Claims (14)
1. A computer-readable, non-transitory medium storing a digital content distributing program causing a server for distributing digital content including; data in which digital copyrighted work is stored, and a plurality of separation data separated from the data, the data having a header, which stores position information for specifying a separation region in which one of the plurality of separation data is separated, and each separation region in which the separation data is separated, stores position information for specifying other separation regions in an interlinked manner, and the data excluding the separation region is encrypted by a content key of the data, while the separation region of the data and the separation data separated from the separation region are encrypted respectively by a content key different for each separation data, to execute a process, the process comprising:
sending a content key of the data associated with a distribution request of the content key for decrypting the data, and an identifier for identifying the separation data separated from the separation region specified by the position information stored in the header of the data when there is the distribution request; and
sending separation data associated with a distribution request of the separation data specified by the identifier, a content key of the separation data, and an identifier for identifying the separation data separated from the separation region specified by the position information stored in the separation region in which the separation data is separated when there is the distribution request.
2. A computer-readable, non-transitory medium storing a digital content distributing program according to claim 1 , wherein the process of sending the content key and the identifier in response to the distribution request of the content key and sending the separation data, the content key and the identifier in response to the distribution request of the separation data, collectively sends source information of the separation data specified by the identifier.
3. A computer-readable, non-transitory medium storing a digital content distributing program according to claim 1 , the process further comprising generating the digital content in response to a user instruction.
4. A computer-readable, non-transitory medium storing a digital content distributing program according to claim 1 , wherein the separation region stores random data.
5. A computer-readable, non-transitory medium storing a digital content playback program causing a client on which playback is started of data of digital content including; data in which digital copyrighted work is stored, and a plurality of separation data separated from the data, the data having a header, which stores position information for specifying a separation region in which one of the plurality of separation data is separated, and each separation region in which the separation data is separated, stores position information for specifying other separation regions in an interlinked manner, and the data excluding the separation region is encrypted by a content key of the data, while the separation region of the data and the separation data separated from the separation region are encrypted respectively by a content key different for each separation data, to execute a process comprising:
requesting a distribution of a content key for decrypting the data;
requesting a distribution of separation data specified by an identifier when in response to the distribution request of a content key of the data, there is received the content key of the data, and the identifier for identifying the separation data separated from a separation region specified by the position information stored in the header of the data;
requesting a distribution of separation data specified by an identifier when in response to the distribution request of the separation data, there is received the separation data, the content key of the separation data, and the identifier for identifying the separation data separated from a separation region specified by the position information stored in the separation region in which the separation data is separated;
decrypting the data excluding the separation region by using the content key of the data, and decrypting the separation region of the data and the separation data by using the content key of the separation data; and
playing back the data and the separation data based on the separation region specified by the position information stored in the header of the data and in each separation region.
6. A computer-readable, non-transitory medium storing a digital content playback program according to claim 5 , the process further comprising deleting at least separation data and a content key of the separation data, when the separation data for playback is determined to be an expiration object, based on a list in which separation data to be expired is enumerated, received in response to the distribution request of the separation data.
7. A computer-readable, non-transitory medium storing a digital content playback program according to claim 5 , wherein the process of each requesting the distribution of separation data, when in response to a distribution request of the content key or the separation data, the source information of the separation data specified by the identifier are collectively received, requests a distribution of separation data with respect to the source specified by the source information.
8. A computer-readable, non-transitory medium storing a digital content playback program according to claim 5 , wherein the process of playing back the data and the separation data, when a playback position of the data is the separation region, suspends playback of the data, and plays back separation data separated from the separation region.
9. A computer-readable, non-transitory medium storing a digital content playback program according to claim 5 , wherein the process of requesting the distribution of content key requests a distribution of the content key of the data with respect to the source specified by the source information of the content key included in the license of the digital content.
10. A computer-readable, non-transitory medium storing a digital content playback program according to claim 5 , wherein the separation region stores random data.
11. A digital content distributing apparatus for distributing digital content including; data in which digital copyrighted work is stored, and a plurality of separation data separated from the data, the data having a header, which stores position information for specifying a separation region in which one of the plurality of separation data is separated, and each separation region in which the separation data is separated, stores position information for specifying other separation regions in an interlinked manner, and the data excluding the separation region is encrypted by a content key of the data, while the separation region of the data and the separation data separated from the separation region are encrypted respectively by a content key different for each separation data, the digital content distributing apparatus comprising:
a transmitting unit for sending a content key of the data associated with a distribution request of the content key for decrypting the data, and an identifier for identifying the separation data separated from the separation region specified by the position information stored in the header of the data when there is the distribution request, and for sending separation data associated with a distribution request of the separation data specified by the identifier, a content key of the separation data, and an identifier for identifying the separation data separated from the separation region specified by the position information stored in the separation region in which the separation data is separated when there is the distribution request.
12. A digital content distributing apparatus according to claim 11 , wherein the separation region stores random data.
13. A digital content playback apparatus for playing back digital content including; data in which digital copyrighted work is stored, and a plurality of separation data separated from the data, the data having a header, which stores position information for specifying a separation region in which one of the plurality of separation data is separated, and each separation region in which the separation data is separated, stores position information for specifying other separation regions in an interlinked manner, and the data excluding the separation region is encrypted by a content key of the data, while the separation region of the data and the separation data separated from the separation region are encrypted respectively by a content key different for each separation data, the digital content playback apparatus comprising:
a content information acquiring unit for requesting a distribution of a content key for decrypting the data when playback of data is started, and for requesting a distribution of separation data specified by an identifier when in response to the distribution request of a content key of the data, there is received the content key of the data, and the identifier for identifying the separation data separated from a separation region specified by the position information stored in the header of the data, and for requesting a distribution of separation data specified by an identifier when in response to the distribution request of separation data, there is received the separation data, the content key of the separation data, and the identifier for identifying the separation data separated from a separation region specified by the position information stored in the separation region in which the separation data is separated;
a decrypting unit for decrypting the data excluding the separation region by using the content key of the data, and decrypting the separation region of the data and the separation data by using the content key of the separation data; and
a content playback unit for playing back the data and the separation data based on the separation region specified by the position information stored in the header of the data and in each separation region.
14. A digital content playback apparatus according to claim 13 , wherein the separation region stores random data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/855,751 US9584490B2 (en) | 2010-03-24 | 2015-09-16 | Computer-readable, non-transitory medium storing digital content distributing program, computer-readable, non-transitory medium storing digital content playback program, digital content distributing apparatus and digital content playback apparatus |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2010-067465 | 2010-03-24 | ||
JP2010067465A JP5573272B2 (en) | 2010-03-24 | 2010-03-24 | DIGITAL CONTENT DISTRIBUTION PROGRAM, REPRODUCTION PROGRAM, DISTRIBUTION DEVICE, AND REPRODUCTION DEVICE |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/855,751 Continuation US9584490B2 (en) | 2010-03-24 | 2015-09-16 | Computer-readable, non-transitory medium storing digital content distributing program, computer-readable, non-transitory medium storing digital content playback program, digital content distributing apparatus and digital content playback apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
US20120057708A1 true US20120057708A1 (en) | 2012-03-08 |
Family
ID=44877399
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/041,321 Abandoned US20120057708A1 (en) | 2010-03-24 | 2011-03-04 | Computer-readable, non-transitory medium storing digital content distributing program, computer-readable, non-transitory medium storing digital content playback program, digital content distributing apparatus and digital content playback apparatus |
US14/855,751 Active US9584490B2 (en) | 2010-03-24 | 2015-09-16 | Computer-readable, non-transitory medium storing digital content distributing program, computer-readable, non-transitory medium storing digital content playback program, digital content distributing apparatus and digital content playback apparatus |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/855,751 Active US9584490B2 (en) | 2010-03-24 | 2015-09-16 | Computer-readable, non-transitory medium storing digital content distributing program, computer-readable, non-transitory medium storing digital content playback program, digital content distributing apparatus and digital content playback apparatus |
Country Status (2)
Country | Link |
---|---|
US (2) | US20120057708A1 (en) |
JP (1) | JP5573272B2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160006704A1 (en) * | 2010-03-24 | 2016-01-07 | Fujitsu Limited | Computer-readable, non-transitory medium storing digital content distributing program, computer-readable, non-transitory medium storing digital content playback program, digital content distributing apparatus and digital content playback apparatus |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9075960B2 (en) * | 2013-03-15 | 2015-07-07 | Now Technologies (Ip) Limited | Digital media content management apparatus and method |
US10601783B2 (en) * | 2016-05-13 | 2020-03-24 | MyCroft Secure Computing Corp. | System and method for digital payload inspection |
US11522901B2 (en) | 2016-09-23 | 2022-12-06 | OPSWAT, Inc. | Computer security vulnerability assessment |
US9749349B1 (en) | 2016-09-23 | 2017-08-29 | OPSWAT, Inc. | Computer security vulnerability assessment |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040015724A1 (en) * | 2002-07-22 | 2004-01-22 | Duc Pham | Logical access block processing protocol for transparent secure file storage |
US20070083473A1 (en) * | 2005-10-11 | 2007-04-12 | Farrugia Augustin J | Use of media storage structure with multiple pieces of content in a content-distribution system |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6167083A (en) * | 1997-04-04 | 2000-12-26 | Avid Technology, Inc. | Computer system and process for capture editing and playback of motion video compressed using interframe and intraframe techniques |
EP1653463A1 (en) | 1997-05-13 | 2006-05-03 | Kabushiki Kaisha Toshiba | License information copying method and apparatus, license information moving method |
JP3792896B2 (en) | 1997-05-13 | 2006-07-05 | 株式会社東芝 | Information reproducing apparatus and information reproducing method |
WO2006033154A1 (en) * | 2004-09-24 | 2006-03-30 | Fujitsu Limited | Content distribution program |
JP2006148373A (en) * | 2004-11-17 | 2006-06-08 | Hyper Tec:Kk | Divided contents information generating apparatus, contents distribution system, and operating method of divided contents information generating apparatus |
KR100718351B1 (en) * | 2005-09-28 | 2007-05-14 | 주식회사 팬택 | System for displaying to summarize a moving picture and Mobile phone used it |
KR100782847B1 (en) * | 2006-02-15 | 2007-12-06 | 삼성전자주식회사 | Method and apparatus for importing content which consists of a plural of contents parts |
JP2007251438A (en) * | 2006-03-14 | 2007-09-27 | Fuji Electric Holdings Co Ltd | Encrypting method and decrypting method of content |
JP4769665B2 (en) * | 2006-08-29 | 2011-09-07 | パナソニック株式会社 | Music playback device and music playback terminal |
JP2008294770A (en) * | 2007-05-24 | 2008-12-04 | Nec Electronics Corp | Encryption device, decryption device, encryption method and decryption method |
JP5523675B2 (en) * | 2008-01-08 | 2014-06-18 | 株式会社日立製作所 | ENCRYPTION DEVICE, DECRYPTION DEVICE, ENCRYPTION SYSTEM HAVING THEM, ENCRYPTION PROGRAM, AND DECRYPTION PROGRAM |
JP5573272B2 (en) * | 2010-03-24 | 2014-08-20 | 富士通株式会社 | DIGITAL CONTENT DISTRIBUTION PROGRAM, REPRODUCTION PROGRAM, DISTRIBUTION DEVICE, AND REPRODUCTION DEVICE |
-
2010
- 2010-03-24 JP JP2010067465A patent/JP5573272B2/en active Active
-
2011
- 2011-03-04 US US13/041,321 patent/US20120057708A1/en not_active Abandoned
-
2015
- 2015-09-16 US US14/855,751 patent/US9584490B2/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040015724A1 (en) * | 2002-07-22 | 2004-01-22 | Duc Pham | Logical access block processing protocol for transparent secure file storage |
US20070083473A1 (en) * | 2005-10-11 | 2007-04-12 | Farrugia Augustin J | Use of media storage structure with multiple pieces of content in a content-distribution system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160006704A1 (en) * | 2010-03-24 | 2016-01-07 | Fujitsu Limited | Computer-readable, non-transitory medium storing digital content distributing program, computer-readable, non-transitory medium storing digital content playback program, digital content distributing apparatus and digital content playback apparatus |
US9584490B2 (en) * | 2010-03-24 | 2017-02-28 | Fujitsu Limited | Computer-readable, non-transitory medium storing digital content distributing program, computer-readable, non-transitory medium storing digital content playback program, digital content distributing apparatus and digital content playback apparatus |
Also Published As
Publication number | Publication date |
---|---|
JP5573272B2 (en) | 2014-08-20 |
JP2011199812A (en) | 2011-10-06 |
US9584490B2 (en) | 2017-02-28 |
US20160006704A1 (en) | 2016-01-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9584490B2 (en) | Computer-readable, non-transitory medium storing digital content distributing program, computer-readable, non-transitory medium storing digital content playback program, digital content distributing apparatus and digital content playback apparatus | |
WO2018177110A1 (en) | Media content licensing method and device | |
US10650119B2 (en) | Multimedia data processing method, apparatus, system, and storage medium | |
EP3557876A1 (en) | Secret key providing method, video playback method, server and client | |
JP4755189B2 (en) | Content encryption method, network content providing system and method using the same | |
US8874936B2 (en) | Terminal device, verification device, key distribution device, content playback method, key distribution method, and recording medium | |
US8707448B2 (en) | Secure distribution of media data | |
JP6601623B2 (en) | Content distribution system, content distribution method, content generation apparatus, and content generation program | |
JP5875441B2 (en) | Apparatus and method for encrypting data | |
JP2009505506A5 (en) | ||
TW201204011A (en) | Systems and methods for securely streaming media content | |
US20080013726A1 (en) | Content transmission server and content transmission method | |
CN108881966B (en) | Information processing method and related equipment | |
WO2015124053A1 (en) | Terminal triggering method and related device | |
CN103237010B (en) | The server end of digital content is cryptographically provided | |
JP2004193942A (en) | Method, apparatus and program for transmitting content and method, apparatus and program for receiving content | |
US8543623B2 (en) | Secure distribution of media data | |
CN104540016A (en) | Video playing method and device | |
JP2009238212A (en) | Entitled object generation method and its device, entitled object transmission method and its device, and entitled object receiving method and its device | |
JP4791425B2 (en) | Method and system for performing DRM function and additional function using DRM (Digital Rights Management) device | |
US20150350375A1 (en) | Information Processing Method, Trusted Server, and Cloud Server | |
WO2020062667A1 (en) | Data asset management method, data asset management device and computer readable medium | |
JP2008077664A5 (en) | ||
US7886160B2 (en) | Information processing apparatus and method, and computer program | |
CN103237011B (en) | Digital content encryption transmission method and server end |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: FUJITSU LIMITED, JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MARUYAMA, HIDEFUMI;REEL/FRAME:025959/0214 Effective date: 20110301 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |