WO2002067256A1 - Systeme de gestion de copie de programme informatique - Google Patents
Systeme de gestion de copie de programme informatique Download PDFInfo
- Publication number
- WO2002067256A1 WO2002067256A1 PCT/JP2002/001452 JP0201452W WO02067256A1 WO 2002067256 A1 WO2002067256 A1 WO 2002067256A1 JP 0201452 W JP0201452 W JP 0201452W WO 02067256 A1 WO02067256 A1 WO 02067256A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- identification information
- content
- user
- storage medium
- copy
- Prior art date
Links
- 238000004590 computer program Methods 0.000 title description 13
- 238000003860 storage Methods 0.000 claims abstract description 76
- 238000007726 management method Methods 0.000 claims description 152
- 230000010365 information processing Effects 0.000 claims description 35
- 230000008439 repair process Effects 0.000 claims description 23
- 230000006870 function Effects 0.000 claims description 9
- 230000015654 memory Effects 0.000 claims description 9
- 238000012545 processing Methods 0.000 claims description 6
- 230000005540 biological transmission Effects 0.000 claims description 4
- 239000004065 semiconductor Substances 0.000 claims description 4
- 238000009826 distribution Methods 0.000 claims description 2
- 238000003672 processing method Methods 0.000 claims 2
- 238000001514 detection method Methods 0.000 claims 1
- 230000003287 optical effect Effects 0.000 abstract description 86
- 238000000034 method Methods 0.000 description 35
- 230000008569 process Effects 0.000 description 34
- 238000004891 communication Methods 0.000 description 18
- 238000010586 diagram Methods 0.000 description 14
- 230000000694 effects Effects 0.000 description 5
- 230000004044 response Effects 0.000 description 5
- 238000012546 transfer Methods 0.000 description 4
- 238000009434 installation Methods 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 150000001993 dienes Chemical class 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 230000005236 sound signal Effects 0.000 description 2
- 125000002066 L-histidyl group Chemical group [H]N1C([H])=NC(C([H])([H])[C@](C(=O)[*])([H])N([H])[H])=C1[H] 0.000 description 1
- 241000287463 Phalacrocorax Species 0.000 description 1
- 101150107341 RERE gene Proteins 0.000 description 1
- 230000003044 adaptive effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 239000013256 coordination polymer Substances 0.000 description 1
- 230000002950 deficient Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000001172 regenerating effect Effects 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 238000005070 sampling Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/101—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
- G06F21/1011—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/101—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
- G06F21/1014—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to tokens
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00137—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to contents recorded on or reproduced from a record carrier to authorised users
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00253—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
- G11B20/00347—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier wherein the medium identifier is used as a key
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00485—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
- G11B20/00492—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
Definitions
- the present invention relates to, for example, a copy management system that manages copy of a computer program such as game content, movie content, music content, application program, etc., an information processing program of a client terminal device.
- Computer readable storage medium in which the information is stored computer readable storage medium in which the information processing program of the management server apparatus is stored, information processing program of the client terminal apparatus, management server
- the present invention relates to an information processing program of an apparatus and a copy management method.
- the user purchases a storage medium storing desired game content, and reproduces the storage medium on a video game machine to play a video game. In most cases, users gradually buy new video games. For this reason, a storage medium in which each game content is stored is accumulated in the hand of the user along with the date and time.
- the applicant has disclosed a video game machine having a built-in or externally attachable high-capacity hard disk drive (HDD) of, for example, number + G (giga) order.
- HDD high-capacity hard disk drive
- the game content stored in each storage medium can be copied to the HDD respectively, and the HDD power and other desired game contents can be reproduced and used.
- this HDD it is possible to save the trouble of attaching and detaching the storage medium to the playback mechanism of the video game machine.
- a computer program such as game contents should be available only to the user who obtained the software where the computer program was stored, etc. It is.
- the computer program stored in the storage medium can be copied to the secondary storage medium, the computer program stored in one storage medium can be used by a plurality of users as the secondary storage medium. There is a concern about illegal copying to be used by copying.
- the present invention is a copy management system designed to prevent unauthorized use of content, etc., by performing copy management that enables copying of computer programs only to legitimate users.
- a computer readable storage medium storing an information processing program of a client terminal device, a computer readable storage medium storing an information processing program of a management server device, and a client
- An object of the present invention is to provide an information processing program of a terminal device, an information processing program of a management server device, and a copy management method. Disclosure of the invention
- the present invention assigns a unique identification number to a storage medium storing encrypted content encrypted by the user and distributes it to the user.
- the identification number is also attached to the device used when the user copies the content.
- the device When copying the content, the device transmits the identification number of the storage medium and the identification number of the device to the management server device.
- the management server device has a database in which device identification numbers used by each user are registered. The management server device identifies the user by comparing the identification number of the device registered in the database with the identification number of the device transmitted from the user's device. When the user is specified by performing this comparison, the management server device transmits a decryption key for decrypting the content stored in the storage medium to the user's device.
- the user device decrypts the content stored in the storage medium based on the decryption key distributed from the administrator side to copy the content.
- FIG. 1 is a block diagram showing a system configuration of a copy management system according to a first embodiment of this invention.
- Figure 2 shows the client terminals that make up the copy management system It is a perspective view showing the appearance of a hard disk drive (HDD).
- HDD hard disk drive
- Figure 3 is a block diagram showing the electrical configuration of the client terminal.
- Figure 4 is a diagram for explaining the optical disc used in this copy management system, in which the content encrypted with the content key (Conon t nt-K e y) is stored.
- Figure 5 is a flow chart showing the flow of user registration in the copy management system.
- FIG. 6 is a schematic diagram of a copy management system showing each piece of information transmitted and received between the client terminal device and the system server device at the time of user registration.
- Fig. 7 is a flowchart showing the registration operation of the media unique ID (MID) individually attached to the optical disk and the acquisition operation of the contrast (Content-K ey) in the copy management system. It is a part.
- FIG. 7 is a schematic view of a copy management system showing each piece of information transmitted to and received from the device.
- Figure 9 is a flow chart showing the flow of copying in the copy management system.
- Figure 10 is a schematic diagram showing each piece of information sent and received between the client terminal, memory card and hard disk drive when copying is performed.
- Figure 11 is a flowchart showing the playback operation of the content copied to the hard disk drive in the copy management system.
- Figure 12 shows the information sent and received between the client terminal, memory card and hard disk drive during playback of the content copied to the hard disk drive. It is a schematic diagram shown.
- Figure 13 is a schematic diagram to explain the copy management system's response to repair or replacement of client terminals or hard disk drives.
- Figure 14 is a schematic diagram to explain how the copy management system responds to memory card corruption or loss.
- FIG. 10 is a schematic view of a copy management system according to a second embodiment of the present invention, showing each piece of information transmitted to and received from the device.
- the present invention can be applied to a copy management system that manages copy of a computer program.
- Examples of computer programs include game contents, music contents, movie contents and application programs.
- a storage medium for storing computer programs there are semiconductor memories in addition to optical disks such as DVD-ROM and CD-ROM.
- optical disks such as DVD-ROM and CD-ROM.
- hard disk (HD) and DVD are the secondary storage media to which computer programs are copied.
- RAM random access memory
- MM magneto-optical disk
- content J the above game content, music content, movie content, application program, etc. are collectively referred to simply as “content J”.
- FIG. 1 shows the overall configuration of a copy management system according to a first embodiment of the present invention.
- the copy management system according to the first embodiment includes the reproduction function (execution function) of the content stored in the optical disk, and the network.
- the client terminal 1 is connected to a hard disk drive 2 (HDD) for copying content stored in the optical disk.
- HDD hard disk drive
- a communication modem 6 for connecting to a network such as the Internet 5 is connected to the client terminal device 1.
- the communication modem 6 may be provided externally to the client terminal device 1 as shown in FIG. Also, communication modem 6 may be installed in client terminal 1 in a built-in form.
- the copy management system also has a system server device 4 provided with a database 3 in which user entry information is stored.
- the system server device 4 and the client terminal device 1 are connected to each other via a network such as the Internet 5, for example.
- a copy management system in the form of is configured.
- Figure 2 shows a perspective view of the appearance of client terminal device 1. As shown in FIG. 2, controller connections 7A and 7B and memory card mounting portions 8A and 8B are provided on the front side of the client terminal device 1. ing.
- USB connection terminals 9 connected with USB compatible devices (USB: Universal Serial Bus) power S and a data transfer speed of, for example, up to 40 OM bps
- USB compatible devices USB: Universal Serial Bus
- a tray type disk mounting unit 11 is provided to which an optical disk is mounted.
- a reset button 12 for resetting the content execution operation and playback operation, and the tray of the optical disc loading unit 11
- tray operation buttons 1 and 3 for operating the loading and unloading.
- a power switch On the back side of client terminal 1, a power switch, audio / video output terminal (AV multi output terminal), PC card slot, optical digital output terminal, AC power input terminal, etc. are provided. It is done.
- the AV multi output terminal is connected to a television receiver 1 8 for monitoring via an AV cable 1 7.
- the video and audio signals output from the client terminal 1 are supplied to the television receiver 18 for monitoring via the AV multi-output terminal and the AV cable 17.
- the video of the above content is displayed on the television receiver 18.
- the audio of the above content is pronounced through the speaker device of the television receiver.
- Controller cable 1 at controller connection 7 A, 7 B Controller 1 4 is connected via 5 respectively.
- Memory card mounting unit 8 A, 8 B is equipped with a memory card for saving and reading out game data.
- the housing placed on the top of the client terminal device 1 is a hard disk drive 2 (hereinafter referred to as HDD 2).
- the H.sub.DD 2 is internally provided with a large capacity hard disk such as 40 GB. It is possible to copy the game contents stored in more than a dozen pieces of D V D-R O M in this H D D 2.
- a power supply lamp 20 which is driven to light when the power is turned on and a writing indicator lamp 21 which is driven to light in synchronization with writing to the hard disk.
- a power switch and data input / output terminals are provided on the back side of the HDD 2.
- the HDD 2 is separate from the client terminal 1 and is externally attached to the client terminal 1.
- the HDD 2 may be incorporated in the client terminal 1.
- connection client terminal 1 and HDD 2 to a PC card. It was decided to connect via a connection cable.
- the connection terminal such as the USB connection terminal or the IEEE 1349 connection terminal is provided on the back side (or the front side) of the HDD 2 and the HDD 2 is connected via the connection terminal. It may be connected to the ant terminal device 1.
- Fig. 3 is a block diagram of the client terminal device 1.
- the client terminal 1 has a CPU 30, a graphics processor 31 (GPU), and an IO processor 32 (IOP). Teru.
- the client terminal device 1 includes an optical disk control unit 33 for controlling reproduction of optical disks such as a CD-ROM and a DVD-ROM, and a sound processor unit 34 SPU) and have.
- an optical disk control unit 33 for controlling reproduction of optical disks such as a CD-ROM and a DVD-ROM
- a sound processor unit 34 SPU sound processor
- client terminal device 1 can be used in conjunction with MASK-ROM 35, which stores operating system programs executed by CPU 30 and IOP 32, and with work areas and CPUs of CPU 30. It has an RAM 36 that functions as a buffer for temporarily storing data read from an optical disk.
- the client terminal device 1 corrects, for example, an error in the reproduction output from the optical disc supplied via the RF amplifier 3 7 of the optical disc control unit 33. It has a CD / DVDDSP 3 8 that performs processing (CRC processing) and outputs it.
- CRC processing processing
- Client terminal 1 also controls the spindle motor's rotation control, optical pick-up focus Z tracking control, and disco- It has a train controller 39 and a controller 40 for controlling the loading of the lay.
- client terminal device 1 is connected to the above PC card. It has a card type connector 4 1.
- bus lines 42, 43 and so on are connected to each other mainly via bus lines 42, 43 and so on.
- the playback of movie content stored in D V D-R O M is performed based on D V D dry software stored in memory card.
- playback of movie content is based on DVD software that has been burned into semiconductor memory 4 4 (DVD Player ROM) built into client terminal 1. Be done.
- Operating system programs are stored in MASK-ROM 3 5.
- the CPU 300 controls the overall operation of the client terminal 1 based on the operating system program stored in this MASK-ROM 35.
- the MA SK-ROM 35 is connected to the controller connections 7A and 7B, the memory card attachment 8A and 8B, and the card type connector 41.
- the hardware identification numbers (hardware ID) of the controller 14, memory card 16 and HDD 2 are also stored. Based on the nodeware ID stored in this MASK ROM 3 5, IOP 3 2 and hardware such as controller 1 4, memory power 1 6 and HDD 2 etc. Communication is performed to identify and recognize the hardware connected to each connection terminal 7 A, 7 B, 8 A, 8 B and card type connector 41 etc.
- the hardware ID is one ID for the client terminal 1 as a whole, one ID for the memory card 16 as a whole, and one ID for the HDD 2 as a whole. It means a generically assigned ID for each hardware.
- client ID, MC-ID and HDD- ID which will be described later, are for each client terminal 1, memory card 16 and HDD 2. It is a unique ID for each attached hardware.
- G PU 31 draws according to the drawing instruction from C PU 3 0, and stores the drawn image in a frame buffer (not shown).
- GPU 31 has a function as a geometry transfer engine that performs processing such as coordinate conversion.
- this GPU 3 1 constructs a virtual 3D object by a set of triangular polygons. Then, GPU 31 performs calculations to generate an image obtained by photographing this three-dimensional object with a virtual camera device. That is, the GPU 3 1 performs perspective transformation in rendering (when the vertex of each of the polygons constituting the three-dimensional object is projected onto a virtual camel clean) Calculation of coordinate values etc.
- the GPU 31 draws the frame buffer using the geometry transfer engine as needed according to the drawing instruction from the CPU 30. Then, the video signal (V isua 1 out) corresponding to this drawn image is output.
- SPU 3 4 reproduces audio signals such as sound effects by reproducing ADPCM decoding function that reproduces adaptive predictive coded audio data and reproducing waveform data stored in the sound buffer. Output (audio out) playback function, modulation function to modulate waveform data stored in the sound buffer, etc. Have.
- This SPU 3 4 operates as a so-called sampling sound source.
- the SPU 34 generates voice signals such as musical tones and sound effects based on waveform data stored in the CPU and instructions of the CPU 30 and the like and the sound buffer.
- the CPU 30 and the IOP 32 can operate the operating system program for the CPU 30 and the MASK ROM 3 5 power. ⁇ Read the operating system program for P32 respectively.
- C PU 30 centrally controls the components of client terminal 1 using the operating system program for C PU 30.
- I O P 32 controls the input and output of data between the controller 14, memory card 16, and H D D 2 etc. by the operating system program for I O P 32.
- the CPU 30 performs initialization processing such as operation check based on the operating system program for the CPU 30, then controls the optical disc control unit 3 3 to be recorded on the optical disc. Control playback of content.
- the CPU 30 follows the instructions (commands) received from the controller 14 via the IOP 32 from the player. It controls the GPU 3 1 and SPU 3 4 to control the display of game content images and the production of sounds such as effect sounds and tones.
- CPU 30 controls GPU 3 1 or SPU 3 4 according to the instructions received from controller 14 via IOP 32. Shi, movie co Control the display of the image of the key, the utterance of the sound, etc.
- Such a copy management system manages the content stored in the optical disc as follows when it is copied to the HDD2.
- the client terminal device 1 uses the copy control application to copy the content. It is necessary to execute the program (Instrutor).
- the installer is stored on the optical disk with the context. The client terminal 1 installs the installer before copying the content.
- the user mounts the optical disk in which the installer is stored on the client terminal 1.
- Client terminal 1's CPU 30 automatically (automatically) when this optical disk is installed, or for the operation of the user's controller 14 Therefore, it reads the installer stored in the optical disk and stores it in the memory card 16 or RAM 36.
- the installer stored in this memory card 1 6 or RAM 3 6 is used by the CPU 30 when the user specifies a copy of the content stored in the optical disk. It will be executed. C PU 30 performs copy control of content by executing this installer.
- the installer only writes the installer at the system vendor side. It may be possible to manufacture a remembered optical disk and distribute it to users. Alternatively, the system vendor may manufacture a memory card with the installer stored and distribute it to the user. In this case, you can make installation work of the installer optional. Alternatively, the client may be provided in client terminal device 1 in which the installer is stored. Even in this case, installation of the installer can be omitted.
- the content stored in the optical disk is encrypted using a different symmetric key (Content key: Connt-K ey) for each content. ing.
- the optical disk also has a "Mediaunique ID (MID)" that is unique to each optical disk. It is memorized.
- the memory card 1 6 when copying content to the HDD 2 from the optical disk drive, the memory card 1 6 is uniquely attached. Perform user registration on system server device 4 using the memory card ID (MC-ID). If this user registration is not performed, copying of the content is not permitted.
- MC-ID memory card ID
- FIG. 5 is a flowchart showing the flow until the user performs user registration with the system server device 4.
- Fig. 6 is a schematic diagram of the copy management system showing information transmitted / received between the client terminal device 1 and the system server device 4 by this user registration. .
- the user registration operation will be described using FIG. 5 and FIG.
- the flowchart in Fig. 5 is started when the user turns on the client terminal 1's main power.
- step S 1 the user connects his client terminal 1 to system server 4 via Internet 5. Specifically, as shown in FIG. 1, a communication modem 6 for internet connection is connected (or built in) to this client terminal device 1.
- the CPU 30 shown in FIG. 3 operates based on a predetermined WWW browser, and via the communication modem 6, the client terminal concerned is operated. Establish a communication line between the device 1 and the system server device 4. By this, the process of this user registration proceeds to step S2.
- step S2 the CPU 30 is assigned to the identification number (MC — ID) of the memory card installed in the client terminal 1 and to each client terminal 1 It sends and controls the unique identification number (client ID) and the unique identification number (HDD-ID) assigned to each HDD 2 to the system server device 4.
- the CPU 30 can execute the client terminal device 1, the HDD 2 and the memory card 1 6 Communicate with each other.
- the CPU 3 0 uses an identification number uniquely assigned to the client terminal 1 (client ID), an identification number uniquely assigned to the HDD 2 (HDD — ID), • Obtain an identification number (MC-ID) uniquely assigned to the memory card 1 6 mounted on the client terminal 1.
- the CPU 3 0 transmits these identification numbers to the system server 4 as shown in FIG. this Then, the process of this user registration proceeds to step S3.
- the CPU 30 acquires the client ID, HDD — ID and MC — ID, and transmits them to the system server 4 side. And.
- client ID 1, HDD 2 and memory card 1 6 have client ID, HDD ID and MC ID each visible to the user in each case. It is pasted at. For this reason, the user sees this client ID, HDD — ID and MC — ID, and operates the controller 14 ′ to manually input each ID and transmit it to the system server 4 side. You may do it.
- step S3 the system server device 4 determines whether the memory card identification number (MC — ID) transmitted from this user is a valid ID.
- the system server device 4 determines in this step S3 that the MC sent from the user is a valid ID, the procedure proceeds to step S4. If it is determined that the MC sent from the user is an invalid ID, the process proceeds to step S7.
- the system server device 4 includes the client IDs of all the client terminal devices 1, the HDDs-IDs of all the HDDs 2, and the MCs of all the memory cards 1 6 — Have database 3 that stores ID.
- System server device 4 is from user to client terminal device 1 When each unique ID of HDD 2 and memory card 1 6 is sent, first, the memory card 1 6's unique ID MC — ID sent from the user, and registration in database 3 Match each of the registered MCs—IDs, and determine whether the same MC as the memory card ID of the memory card 1 6 sent from the user—ID—is registered in database 3 or not.
- the system server device 4 determines whether the M C — ID of the memory card 16 transmitted from the user is the same as the M C — ID properly registered in the database 3.
- the system server 4 sends The user registration access of is judged as the unauthorized user registration access. In this case, in step S7, the system server device 4 clears the message for rejecting user registration such as, for example, "This user can not register with this memory card.” Terminal equipment
- a user ID which is a unique ID of the user currently accessing the system server device 4, is formed using, for example, a random number.
- the system server device 4 together with its user ID, HDD-ID and MC-ID
- the user ID (User ID), which is a unique ID of the user, and MC_K ey described later are put together and registered in the database 3 of the system server device 4 as “user entry information”. Ru.
- the combination of the three IDs of client terminal 1, HDD 2 and memory card 16 owned by each user is used for each user. Identify and register in database 3.
- each ID is a unique I ⁇ , so that users can be identified with certainty and user registration can be performed without duplication among different users.
- step S5 the system server device 4 recognizes the user entry information formed in step S4 as the proof that the user registration has been completed properly. Among them, encrypt the user ID (User ID) with MC — Key and send it back to the client terminal 1 side.
- M C —K e y is key information for encrypting information to be transmitted and received between the client terminal device 1 and the system server device 4.
- This M C — K e y is pre-stored in the memory card 16 together with M C — I D.
- the MC — ID is affixed to the memory card 16 so as to be visible to the user, the MC — K ey is not visible to the user. It is stored in the memory card 1 6.
- this MC—K ey is highly confidential information that can not be displayed or output even when the user reproduces the information stored in the memory card 16. There is. Because of this, this M C — K e y can not be recognized at the user level.
- the MC-ID stored in each memory card 16 is stored together with all the memory cards 16-MC-ID.
- the system server device 4 needs M C — K e y, it reads out and references M C — K e y from these three databases. For this reason, there is no case where client terminal 1 sends M C —K e y to system server 4.
- the MC-K ey can not recognize at the user level, nor can it be transmitted or received between the client terminal 1 and the system server 4.
- the information is
- the memory card 1 6 of the currently accessed user is selected from among MC—K ey stored in advance in the database 3. Select the corresponding MC_K ey. Then, using the selected M C —K e y, the user I D (U S e I I D) is encrypted and sent back to the client terminal device 1.
- This M C _ K e y is the above user I D (Us er I D), the media unique I D (m e i a i n i q i I d (M I D)), the content key (Con on t — K e y), and
- Conn t e n t-G e n-K e y is used when decoding each.
- the MID is an ID uniquely assigned to each optical disc.
- the content key is the encryption key used to encrypt the content recorded on the optical disk.
- Conn t e t-G e n 1 K e y is an encryption key used when re-encrypting the content to be copied to HD 2.
- the client terminal 1 decodes the content reproduced from the optical disc using the above content. Then, client terminal device 1 re-encrypts the decrypted content using HDD-G and then copies it to HDD 2. It has become. Details will be described later.
- the client terminal device 1 controls the storage of the user ID (User I'D) returned from the system server device 4 side into the memory card 1 6 Do.
- the memory card 16 is an MC-K ey encrypted user together with the MC-ID and MC-K ey stored in advance as shown in FIG.
- the ID (U ser ID) will be stored.
- the system server device 4 After confirming that the content key has not been sent to the media unique ID received from the client terminal device 1, the system server device 4 sends the content one message. I do . This makes it possible to limit the transmission of the contrast key to the same media unique ID to only one time.
- FIG. 7 shows the flow until the registration of the media unique ID (M ID) and the user acquiring the content key.
- Figure 8 shows each information sent and received between the client terminal 1 and the system server 4 at the time of registration of the media unique ID and at the time of acquisition of the content key.
- the registration of the media unique ID (M ID) and the acquisition operation of the content key will be described using FIGS. 7 and 8.
- the media unique ID (MID) registration and context acquisition process (registration acquisition process) shown in the flowchart in Fig. 7 indicate that the user has properly ended the aforementioned user registration. It is executed as a premise.
- step S 11 the client terminal device 1 establishes a communication line with the system server device 4. By this, The registration process proceeds to step S12.
- this registration acquisition process is to be executed without disconnecting the communication line established between the client terminal device 1 and the system server device 4. It is also good. In this case, this registration acquisition process skips step S11 and proceeds from the start force to step S12.
- step S12 the client terminal device 1 sends the user ID (Us ID) and M C — ID obtained as described above to the system server device 4. Also, the client terminal device 1 is a media unique uniquely attached to the optical disk on which the content to be copied from now on to the HDD 2 is stored together with the user ID and MC-ID. Send the ID (MID) to the system server 4 side.
- the CPU 30 communicates with the memory card 16 and transmits the MC_ID to the system server 4 as shown in FIG. Also, as described above, the CPU 30 reads the user ID encrypted by the MC-K ey from the memory card 16 and sends it to the system server 4 side.
- the CPU 30 also controls the optical disk control unit 33 to encrypt the media unique ID (MID) reproduced by the optical disk with MC—K ey, which is then used as a system server. Send to device 4 side.
- the client ID and HDD — ID may be transmitted to the system server 4 side together with each of these pieces of information.
- Client ID and HDD-ID can be used together with the above MC-ID to identify the user. By identifying the user using the three IDs of MC_ID, client ID and HDD—ID, the user can be more accurately identified than when the user is specified only by MC—ID. Can identify the
- information transmitted and received between the client terminal device 1 and the system server device 4 is encrypted and transmitted based on a communication protocol such as Secure Sockets Layer (SSL), for example.
- SSL Secure Sockets Layer
- step S13 the system server device 4 determines whether or not the user ID (U ser ID) sent from the client terminal device 1 is a valid ID. .
- this registration acquisition process proceeds to step S14.
- the registration acquisition process proceeds to step S17.
- the system server device 4 refers to the database 3 based on the MC- ID (and client ID, HDD ID) sent from the client terminal 1 side.
- MC Reads the MC—K ey corresponding to the ID.
- the system server device 4 receives the user ID (U ser ID) and the user ID encrypted and transmitted by the MC — key based on this MC — key. Decrypt each key ID (MID).
- the system server device 4 searches the user information of the three databases based on the MC — ID (client ID and HDD — ID). Then, the system server device 4 collates the user ID (User ID) in the user information with the user ID (User ID) of the user who is currently accessing the system server device 4 side. .
- the system server device 4 determines that the user currently accessing the system server device 4 is a legitimate user. Thus, this registration acquisition process proceeds to step S14.
- system server device 4 has the user ID (User ID) in the user information of the database 3 and the user ID of the user who is currently accessing the system server device 4 (U If the ID does not match, the user ID (U ser ID) is considered invalid. Then, at step S17, system server device 4 receives a message prompting the user to register again, for example, "Invalid user ID. Please register as a user.” Reply to terminal 1 side (notice of invalidity). As a result, this registration acquisition process will be terminated in the form of interruption.
- step S14 the system server device 4 determines whether the content recorded on the optical disk of the currently accessed user has a history of copying in the past or not. Do. Specifically, in the case of this copy management system, all media unique IDs (MIDs) attached to each optical disc are registered in database 3. The system server device 4 keeps a copy history by flagging the media ID (MID) of the database 3 when the content is copied. It has become.
- MID media unique ID
- system server device 4 decrypts the media unique ID (M ID), it detects whether or not the flag is set for the media unique ID (M ID). In this way, it is possible to determine whether the content has been copied in the past, such as an optical disc with the media unique ID (M ID). If the medium unique ID (MID) is not flagged, the contents of the optical disc with the medium unique ID (MID) have not been copied in the past. It means this. Therefore, system server device 4 flags the media unique ID (M ID) in database 3. In addition, the system server device 4 registers this flagged medium ID (MID) in the user entry information of the user, and proceeds to step S 15 of this registration acquisition process. Advance.
- the system server device 4 rejects the copy of the content such as, for example, “It is not possible to copy this medium, other content” in step S17. Yes Message to client terminal 1 side (notification notice). This will end this registration process in the form of interruption.
- step S15 is a step to be performed if copying of content has not been performed from the optical disk of the user in the past.
- the system server device 4 uses the user's memory card MC 6-K ey to encrypt the content recorded on the optical disc with the content key (Content-K ey). Perform encryption. Then, this encrypted content key is sent to the client terminal 1 side.
- the transmission of the content key means that the system server 4 side has permitted the user to copy the content recorded on the optical disk.
- M C-K e y is uniquely assigned to a memory card 1 6 owned by the user. Therefore, the user who can decrypt and use this content key can be limited to only the user who has the memory card 16 in which the M C —K e y is stored. Therefore, the above content key can be safely transmitted only to legitimate users.
- the system server device 4 uses the client ID of the client terminal device 1 and the HDD 2 of the HDD 2 used by the user. Read the ID.
- the system server device 4 encrypts each of these IDs using, for example, “Content – G en — K ey;” formed by using random numbers, and sends it back to the client terminal device 1 side. Do.
- system server device 4 has client ID and HD.
- D The content key (Content-G en -K ey) used when encrypting ID is encrypted with the above MC — Key and sent back to the client terminal 1 side.
- the client terminal device 1 collates the client ID returned from the system server device 4 with the client ID of the client terminal device 1 concerned. Also, the client terminal device 1 collates the HD-ID transmitted from the system server device 4 with the HD D-ID of the HD D 2 connected to the client terminal device 1. Then, client terminal device 1 confirms that the above two client IDs and the above two HDD — IDs match each other, and then copies the content. Become a
- the system server device 4 sends the client ID and HDD registered in advance to the client terminal device 1 of the user in advance.
- the content can be copied only when the client terminal 1 and HDD 2 are registered.
- the system server device 4 has an MC-K unique to the memory card 1 6 owned by the user of the content ID key encrypted with the client ID and the HDD ID. It encrypts using ey and sends it back to the client terminal 1 of the user. As a result, it is possible to limit the users who can decrypt and use the content key to only the user having the memory card 16 in which the MC—Key is stored. Therefore, it is possible to safely transmit the content described above only to authorized users.
- the client terminal device 1 receives the MC-K ey encrypted content key (Content-K ey) returned from the system server device 4 side.
- this copy management system only permits copying of the content that has been stored in the past on the optical disk that has media unique ID (M ID) with no copy history.
- M ID media unique ID
- the user can obtain the content key (C ontent-K ey) to copy the content recorded on the optical disc to the HDD 2. Obtain.
- Figure 9 is a flow chart showing the flow of this copy process
- Fig. 10 is a copy of client terminal 1, HDD 2, and photo terminal when copying of this content is performed. It is a diagram that schematically shows the information handled between the re- sources 1 6. The copy process of the content is explained using Fig. 9 and Fig. 10.
- the user who has finished the above-mentioned registration of the media unique ID and has obtained the content key operates the client terminal device 1 to copy the content. It becomes a start by specifying it.
- step S 2 the client terminal 1 's IOP 3 2 is MC—K ey -encrypted content key (Content / K ey) and soft key content (Content—) Read G en — K ey) from the memory card 16 and supply them to the CPU 30.
- M C — K e y is held by the system server device 4 and this client terminal device 1 respectively.
- the CPU 30 uses the stored MC-K ey to use the above-mentioned encoded content (Content-K ey) and content-gen key (Content-G). Decode en — K ey). Then, C PU 3 stores and controls this decrypted content key and content content bit into RAM 3 6. Thus, the copy process proceeds to step S 2 2.
- step S 2 2 the IOP 3 2 stores the client ID and HDD— ID memory card 1 6 card encrypted with the content key (Content — G en — Key). Read them and supply them to the CPU 30.
- C P U 30 decodes this client I D and H D D-I D by using the content key (Conon t-t-G en-K e y) decoded earlier.
- step S22 the CPU 30 collates the decrypted client ID with the client ID assigned to the client terminal device 1.
- CPU 3 0 is the above decryption Check the checked HDD — ID against the HDD — ID of the HDD 2 connected to the client terminal 1 concerned.
- step S 2 C PU 3 determines whether or not each of the client ID and ID and ID above match. If the two match, this copy process proceeds to step S 24 to execute copying of the content. If the two do not match, this copy process proceeds to step S 2 8.
- Memory card 1 6 If the client ID and HDD—decrypted from the computer, do not match the client ID and HDD — ID of the client terminal 1 The figure indicates that the acquisition of the content key (C ontent-K ey) described above is not performed based on the client terminal 1 and HDD 2 of the authorized user.
- the CPU 300 displays and controls, to the user, a message for rejecting the copy of the content such as, for example, “You can not copy.” As a result, this copy process will end in the form of interruption.
- step S24 is a step executed when the client terminal 1 detects a match between each client ID and each HDD — ID.
- the CPU 30 uses the content reproduced from the optical disk power by the optical disk control unit 33 and the content key (Content-K ey) stored in the RAM 36. Use and decrypt.
- CPU 3 0 is This decrypted content is re-encrypted using Content-Key (Content-G en -K ey) stored in RAM 36 and supplied to HDD 2.
- step S 25 the HDD 2 stores (copies) the content re-encrypted with the above content item onto the hard disk as shown in FIG. 10. .
- step S26 the client terminal device 1 CPU 300 communicates with the HDD 2 to determine whether copying of the content has been completed. If copying has not been completed, the CPU 30 repeats execution control of step S 24 and step S 25 described above to complete copying of the content. Until then, supply content to HDD 2. When copying of the content is complete, this copying process proceeds to step S 2 7.
- step S 2 copying of the content is completed, so I O P 32 erases the content key (Conon t-K e y) stored in the memory card 1 6. This completes the copy process.
- the client terminal device 1 can use the contents of the system server device 4 to store the content that has been encrypted with the content key (Content-K ey) and stored in the optical disk. Decrypt with the issued context key and copy to HDD 2. Then, after copying this content, delete the content stored in the memory card 16 (the content issued from the system server 4) and write it.
- the content key Content-K ey
- the copy history remains in database 3, so the system In principle, content server devices 4 do not reissue content keys. Therefore, a copy application from a third party who has been granted an optical disk once the content has been copied is The system server device 4 rejects based on the copy history of the above database. Then, the system server device 4 does not transmit the content key to this third party.
- the above third party can not obtain the content key, and can not decrypt the content stored in the lent optical disk. Therefore, even if the third party can copy the content to a secondary storage medium such as HDD, it can not decrypt the content, so the content is used. Can not do it. Therefore, this copy management system can prevent the unauthorized use of the content.
- the content copied to HD 2 in this way can be played back and used repeatedly by the user.
- Figure 11 shows a flow chart showing the flow of the reproduction process of the content stored in HD2.
- Figure 12 shows a schematic diagram of the information handled between client terminal 1, HDD 2 and memory card 16 during this reproduction process.
- FIG. 1 1 starts when the user who has finished copying the above content has specified that the content be played back.
- IOP 32 of client terminal 1 is a memory card for the content encrypted with the above MC-K ey (Content-G en -K ey) Read from 1 6 power, Supply this to CPU 3 0.
- the CPU 30 decrypts and reproduces this content genre key using MC—K ey held on the client terminal 1 side.
- step S32 the IOP 32 stores the client ID and HDD ID memorized with the content key (Content — G en — K ey), and the memory card 1 It reads 6 powers and supplies it to CPU 3 0.
- the CP U 30 decrypts the encrypted client ID and HD-ID using the content key decrypted earlier.
- step S33 the CPU 30 decodes the client ID that has been assigned to the client terminal 1 and the client that has been decoded with the content database described above. Match the ant id.
- C PU 30 collates the H D D-I D of the H D D 2 connected to the client terminal 1 with the H D D-I D decoded with the above content diene key.
- step S 35 C PU 30 displays to the user a message for refusing the reproduction of the content, for example, “It is not possible to reproduce the content.” This will end the process of regenerating this content in a way that is interrupted.
- the client ID and HDD-ID are also collated.
- a third party connects the loaned memory card 16 and the HDD 2 to his client terminal device, and plays back the content stored in the HDD 2. It is about to do
- the client ID stored in the memory card 16 is the client ID of a legitimate user. Because of this, the client ID of the third party client terminal does not match the client ID stored in the memory card 16. The playback of the content stored in HDD 2 is refused at the third party client terminal. This makes it possible to prevent the use of content copied to HDD2 even when memory card16 and HDD2 are lent.
- the CPU 30 decodes the contents of the HDD 2 using the contents key decoded earlier. This is memorized in RAM 36. This completes the reproduction process of this content.
- R A M 3 6 If the content stored in R A M 3 6 is, for example, a game content of a video game, C P U 30 operates based on this game content. Then, for example, the CPU 300 controls the display of video game characters and controls the sound generation of sound effects, BGM, and the like. This allows the user to enjoy video games based on the game content copied to HD 2 through HD disk power.
- the content key stored in the memory card 16 is deleted, so re-copying of the content should be performed. I can not However, the content stored in the memory card 1 6 will not be erased after copying is complete. For this reason, the content encrypted with the content key and copied to the HDD 2 is repeatedly decrypted using the content key which is stored in the memory card 1 6 and recorded. It is reproducible.
- the system server device 4 includes the client ID, HDD — ID, MC — ID etc. (hereinafter collectively referred to as device ID), user ID and so on. It manages collectively as user entry information.
- device ID the device ID registered as user entry information. It will be different. Therefore, there is a concern that replacing the device will make it impossible to copy or play back the content using the replaced device despite being a legitimate user.
- the uniqueness of device ID In order to prevent unauthorized use of the content, it is necessary to secure the content. Therefore, even if the device such as the client terminal device 1 or the HDD 2 is restored by repair, the device ID after the repair is different from the device ID assigned before the repair. It is preferable to assign a unique device ID to clearly distinguish and manage the pre-repair device and the post-repair device.
- This copy management system prevents the above-mentioned inconveniences that might be caused by using a new device ID by repairing and replacing the de- vice as follows.
- FIG. 13 shows a schematic diagram for explaining the response to repair and replacement of client terminals and HDD in this copy management system.
- the client terminal device 1 or the HDD 2 in which an X mark is drawn in this figure 13 indicates a broken device.
- the memory card 1 6 is not damaged, but the memory card 1 6 has a content key (Content-G en-Key) or a content key (Content -Client ID and HDD encrypted with G en-K ey) (hereinafter, each ID is collectively called Device ID) is stored It is done. Therefore, even if the device is damaged, the memory card 16 along with the damaged device is to be sent (or brought in) to the repair center.
- Content key Content-G en-Key
- Device ID Content key
- each ID is collectively called Device ID
- the client ID of the client terminal 1 is stored, for example, in the hardware along with the hardware ID and the operating system program described above.
- the same M A S K-R O M as the above M A S K-R O M 35 is provided in the H D D 2
- the H D D-I D is stored in this M A S K-R O M.
- the device ID different from that of the failed device is stored in the new device's MASK ROM. I Do not exchange ROMs.
- the operator of the repair center regenerates the MC_ID of the memory card 1 6 sent together with the failed device.
- the operator accesses the database 3 of the system server device 4 through the terminal device provided in the repair center, and based on the MC-ID reproduced from the memory card 1 6, Database Refer to the user entry information stored in source 3.
- the operator operates the terminal to correct and register the device ID among the user entry information stored in the database 3 with the newly assigned device ID.
- the operator operates database 3 through the terminal device, and lowers the above-mentioned flag set for the copied content.
- the operator operates the terminal device and stores it in the memory card 16, and the MC-K ey encrypted content enciphered (Content — G en — K ey ) And the device ID (client ID and HDD — ID) encrypted with Content Encipher (C ontent — G en — K ey). Then, this memory card 1 6 is returned (or handed over) to the user along with the repaired or replaced device.
- the user who returned this memory card 1 6 and the device receives the Media Unique ID (MID) registration and content key (Content-K ey) described using Figure 7 and Figure 8. Operate client terminal device 1 to acquire the data again.
- MID Media Unique ID
- Content key Content key
- the client terminal device 1 accesses the system server device 4 in response to the user's operation, and registers the media unique ID (MID). Then, the client terminal device 1 receives the content stored on the optical disk using the content key (Content-K ey) acquired from the system server device 4 by this registration. Copy it to HDD 2 again.
- MID media unique ID
- the copy management system side by assigning a new device ID to the device restored by repair or replacement, the device before repair and the device after repair can be clearly distinguished. Management.
- Figure 14 shows a schematic diagram to explain how the memory card 16 is damaged or lost in this copy management system.
- the memory card 1 6 shown in a dotted frame in FIG. 1 4 indicates that the memory card 1 6 is damaged or missing.
- the user connects the client terminal device 1 to the system server device 4 via the Internet 5 as shown in FIG. Apply to the system server device 4 for reissuing the memory card.
- the system server 4 sends the input surface data of the user ID to the client terminal 1 side.
- the user's client terminal device 1 is a television receiver.
- the user inputs a user ID on this input screen.
- the memory card 1 6 has been damaged or lost. Therefore, you can not read out the user ID (U ser ID) from the memory card 1 6. Therefore, the user sees the user ID written in the memo book etc. when the user ID is issued, and inputs the user ID.
- the client terminal device 1 transmits the input user ID to the system server device 4.
- the system server device 4 refers to the database information corresponding to the user ID transmitted from the user from the database 3.
- the system server device 4, along with the MC—ID and MC—K ey of the damaged or lost memory card 16, can be selected as one of the contrasts (Content — G en — K ey) or It is possible to recognize the contents etc. copied by the memory card 1 6.
- the system server device 4 sends a new MC ⁇ K ey (N ew ⁇ MC ⁇ K ey) and this N ew ⁇ to the memory card 1 6 new.
- MC K en newly encrypted content (Content-G en — K ey) and this content integrity (Content-G en _ K ey)
- Client ID and HDD Re-record the ID.
- the system server device 4 has an MC so that the user entry information stored in the database 3 becomes the user entry information corresponding to the new memory card 1 6 New. Rewrite ID and MC — Key etc.
- the memory card 16 is damaged or lost, and the user's client terminal 1 and HDD 2 operate normally.
- client IDs and HDs encrypted with Content-Gen-Key (Content-G en -K ev)
- the original device ID is used as D-ID.
- the repair center physically sends this memory card 16 new to the user side, for example, by mail.
- the system server device 4 rewrites the user entry information of the database 3 as well as rewriting the information in the memory card 16 new.
- the user who received the sent memory card 1 6 new is a system for combining the memory card 1 6 new, the client terminal 1 and the HDD 2 in combination. You can use it to copy content and play back the copied content as before.
- the copy management system is a system administrator who uses the content key to encrypt the content. It is stored in an optical disk with a media unique ID (MID) and distributed to users.
- MID media unique ID
- the user When copying content, the user sends an optical disk M ID to the system server device 4. In addition, the user transmits the device ID (client ID, client ID, MC, ID, etc.) of the device used by the user to the system server device 4.
- the device ID client ID, client ID, MC, ID, etc.
- the system server device 4 stores in the database 3 the MID of the optical disk to which the content has been copied in the past, in association with the device ID of the device used by each user.
- system server device 4 refers to database 3 based on the device ID used by the user and the MID of the optical disk. The condition that system server device 4 does not have the same MID registered in database 3 is required. It sends the content key for decrypting the content to the client terminal device 1 of the user.
- the client terminal 1 decrypts the content stored in the optical disk using this content key and copies it to the HD 2.
- This copy management system does not distribute the above content key when a copy application is made by posting the same MID as the MID registered in database 3. Therefore, this copy management system can limit copying of content to one time, and can prevent unauthorized copying of content.
- the user directly connects his client terminal device 1 to the system server device 4 on the system administrator side to After registration, the content was copied (Contont-one-key) etc. to obtain a copy of the content.
- a third party manages the third between the client terminal 1 of the user and the system server 4 on the system administrator side.
- a person management server device is provided.
- the user obtains the content key (Conon t e t-K e y) and the like through this third party management server device.
- the third party management server device charges for provision of this content key (Conon t ent-K e y) and the like.
- Figure 15 shows the copy management system of this second embodiment. The system configuration is shown. Figure 15 shows the flow of acquiring content key (Content-K ey) when copying content from an optical disc.
- Content key Content-K ey
- the system server device 4 and the third party management server device 50 are, for example, a dedicated line or a VPN (Virtual Private Network) that can be used for a private line like a private line. They are connected to each other.
- a dedicated line or a VPN Virtual Private Network
- system server device 4 is not connected to the Internet 5, and this third party management server device 50 is connected to the Internet 5. Therefore, the user can not access the system server device 4 directly, but indirectly accesses the system server device 4 through the third party management server device 50. It becomes this.
- a user who wants to copy contents from an optical disk can use his own client terminal via the Internet 5.
- the user sends MC—ID, user ID (User ID), and media unique ID (MID) to the third party management server device 50 via the client terminal device 1.
- the user sends account information (for example, user name, password, etc.) for the third party management server device 50 to the third party management server device 50 via the client terminal device 1.
- account information for example, user name, password, etc.
- Client terminal 1 receives MC_ID and account information. Transmit to the third party management server device 5 0 as it is.
- the client terminal 1 encrypts the user ID (U ser ID) and the medium unique ID (MID) of the optical disc with MC—K ey, and these are encrypted by the third party management server 5 Send to 0
- the third-party management server unit 50 extracts and acquires account information from the pieces of information transmitted from the client terminal device 1. Also, the third party management server device 50 is a user ID (U ser ID) encrypted with MC — ID, MC — Key, and MC — K via a leased line (or the above VPN), and MC — K Send media unique ID (MID) encrypted by ey to system server device 4.
- U ser ID user ID
- MC — ID encrypted with MC — ID, MC — Key, and MC — K via a leased line (or the above VPN)
- MC — K Send media unique ID (MID) encrypted by ey to system server device 4.
- the system server device 4 When the system server device 4 receives this MC-ID, user ID and MID, it uses the content key (C for decrypting the content encrypted and recorded on the optical disk as described above). Encrypt ontent-K ey) with MC — K ey and send it back to the third party management server device 50. Also, the system server device 4 encrypts the content key (Conon t t-G e n-K e y) with M c —K e y and sends it back to the third party management server device 50. In addition, the system server device 4 encrypts the client ID and HDD of the user with this content key (Content-G en -K ey) to create a third party management server device 50. Send back.
- the third-party management server device 50 is a MC-Key-encrypted content (Kontent-K-ey) and an MC-K-ey-encrypted content diene (Kontent-G).
- the third-party management server device 50 is used for the third-party management server device 50 that was previously sent from the client terminal device 1 at the cost of providing the content key (Content-K ey). Charge the user based on the account information of the
- the client terminal device 1 stores the content key, the content data, the client ID, and the HDD, which are transmitted from the third party management server device 50, in the memory card 16. It is controlled and used to reproduce the content copy and the copied content as described above.
- the third party management server device 50 charges and recovers the amount charged for the provision of content key to the credit card company. Alternatively, the third party management server device 50 recovers by subtracting the charged amount from the prepaid balance.
- the money collected in this way is, for example, distributed between the administrator of the system server device 4 and the administrator of the third party management server device 50 at a predetermined ratio.
- the copy management system of the second embodiment is configured by providing the third party management server device 50 between the client terminal device 1 and the system server device 4.
- the user accesses the system server device 4 via the third party management server device 50 and requests distribution of content key (Content-K ey).
- the third-party management server device 50 distributes this content to the user and performs billing.
- this copy management system can provide a new copy management system such as a copy management system in which a third party (administrator of the third party management server device 50) intervenes.
- the same effect as the copy management system of the first embodiment described above can be obtained.
- this copy management system charges the content key when it is distributed to the user, or via an optical disk or via a predetermined network. Can be distributed to users free of charge.
- the system is distributed to the user without attaching the MID to the optical disk, and when the copy application is received from the user, the system server device 4 or the third party management server device 50 may distribute the content key to the user and charge it.
- the third party management server device 50 charges, but this does not mean that the system server device 4 charges. May.
- the client terminal device 1 transmits the client ID, HDD — ID and MC — ID to the system server device 4 as device identification information. I decided to send it. However, only client ID 1 from client terminal 1 may be sent to system server 4. Likewise, the clear Only the HDD — ID may be sent from the terminal device 1 to the system server device 4. Similarly, only client terminal device 1 may send MC—ID to system server device 4.
- client ID and HDD-ID may be transmitted from the client terminal device 1 to the system server device 4.
- client terminal device 1 client client ID and client computer device ID may be sent to system server device 4.
- the client terminal device 1 may transmit the HDD and ID to the system server device 4.
- the storage medium on which content copying is performed is associated with the device used for copying the content. Copy control prevents unauthorized copying. For this reason, in the Device Lee scan identification information transmitted to the click line A down preparative terminal apparatus 1 or system from the server device 4, Rere yo if possible identification information identifying the Interview one The 0
- the memory card 16 is used in the description of each embodiment described above, in the case of this copy management system, the memory card 16 is always required. do not do.
- the content key key content stored in the memory card 16 is the HDD 2 or client terminal 1 It should be stored in the memory contained in.
- the present invention can be applied to a copy management system that manages copy of a computer program.
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP02712466.8A EP1363284B1 (en) | 2001-02-20 | 2002-02-20 | Computer program copy management system |
KR10-2003-7002467A KR20030069985A (ko) | 2001-02-20 | 2002-02-20 | 컴퓨터 프로그램 복사 관리 시스템 |
CN028021444A CN1479921B (zh) | 2001-02-20 | 2002-02-20 | 计算机程序复制管理系统 |
AU2002232248A AU2002232248B2 (en) | 2001-02-20 | 2002-02-20 | Computer program copy management system |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2001044358 | 2001-02-20 | ||
JP2001-44358 | 2001-02-20 | ||
JP2002-41890 | 2002-02-19 | ||
JP2002041890A JP2002328846A (ja) | 2001-02-20 | 2002-02-19 | コピー管理システム,クライアント端末装置の情報処理プログラムが記憶されたコンピュータ読み取り可能な記憶媒体,管理サーバ装置の情報処理プログラムが記憶されたコンピュータ読み取り可能な記憶媒体,クライアント端末装置の情報処理プログラム,管理サーバ装置の情報処理プログラム,コピー管理方法,クライアント端末装置の情報処理方法、及び管理サーバ装置の情報処理方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2002067256A1 true WO2002067256A1 (fr) | 2002-08-29 |
Family
ID=26609774
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2002/001452 WO2002067256A1 (fr) | 2001-02-20 | 2002-02-20 | Systeme de gestion de copie de programme informatique |
Country Status (8)
Country | Link |
---|---|
US (1) | US7178037B2 (ja) |
EP (1) | EP1363284B1 (ja) |
JP (1) | JP2002328846A (ja) |
KR (1) | KR20030069985A (ja) |
CN (1) | CN1479921B (ja) |
AU (1) | AU2002232248B2 (ja) |
TW (1) | TWI223200B (ja) |
WO (1) | WO2002067256A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100353787C (zh) * | 2004-06-23 | 2007-12-05 | 华为技术有限公司 | 一种移动终端内存储的资料信息的安全保障方法 |
Families Citing this family (79)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE60202568T8 (de) * | 2001-08-08 | 2005-10-20 | Matsushita Electric Industrial Co., Ltd., Kadoma | Urheberrechtschutzsystem, Aufzeichungsvorrichtung, und Wiedergabevorrichtung |
JP2005509996A (ja) * | 2001-11-16 | 2005-04-14 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | ディジタル著作権管理 |
TWI231132B (en) * | 2002-03-26 | 2005-04-11 | Culture Com Technology Macau Ltd | System and method for secure electronic commerce trading |
US20040010628A1 (en) * | 2002-07-11 | 2004-01-15 | Gillam Richard J. | System and method for discouraging unauthorized duplication of data stored on a storage media |
JP3878542B2 (ja) * | 2002-11-29 | 2007-02-07 | 株式会社東芝 | 記録装置 |
FR2848687B1 (fr) * | 2002-12-11 | 2005-10-14 | Wmi Wellcom Multimedia & Inter | Securisation des enregistrements de donnees numeriques |
CN1510675A (zh) * | 2002-12-23 | 2004-07-07 | 皇家飞利浦电子股份有限公司 | 用于在因特网上鉴别一个盘的方法和系统 |
KR20050096930A (ko) * | 2003-01-31 | 2005-10-06 | 악살토 에스.에이. | 스마트카드와 서버 사이의 통신 |
JP4471067B2 (ja) | 2003-02-17 | 2010-06-02 | ソニー株式会社 | コンテンツ複製管理システム、複製管理装置、複製管理方法、コンテンツ複製装置及びコンテンツ複製方法 |
US7835520B2 (en) * | 2003-02-20 | 2010-11-16 | Zoran Corporation | Unique identifier per chip for digital audio/video data encryption/decryption in personal video recorders |
JP2004272341A (ja) * | 2003-03-05 | 2004-09-30 | Sony Corp | 再生方法および装置、記録方法および装置、プログラム記録媒体およびプログラム、並びに記録媒体 |
JP4016865B2 (ja) * | 2003-03-26 | 2007-12-05 | ソニー株式会社 | コンテンツ再生期限管理システム、コンテンツ再生期限管理方法、端末装置、サーバ装置、プログラム、記録媒体 |
GB2404489A (en) | 2003-07-31 | 2005-02-02 | Sony Uk Ltd | Access control for digital storage medium content |
GB2404487A (en) * | 2003-07-31 | 2005-02-02 | Sony Uk Ltd | Access control for digital storage medium content |
US7391691B2 (en) | 2003-08-29 | 2008-06-24 | General Electric Company | Method for facilitating copyright protection in digital media and digital media made thereby |
CN1614697A (zh) * | 2003-11-06 | 2005-05-11 | 皇家飞利浦电子股份有限公司 | 一种解密光盘的方法和系统 |
JP4250510B2 (ja) * | 2003-11-26 | 2009-04-08 | 株式会社東芝 | コンテンツ配信サービス提供システムとそのコンテンツ配信装置及びユーザ端末装置 |
KR100994772B1 (ko) | 2004-01-10 | 2010-11-16 | 삼성전자주식회사 | 저장 매체의 데이터 복사 및 재생 방법 |
WO2005076270A1 (en) * | 2004-02-04 | 2005-08-18 | Koninklijke Philips Electronics N.V. | Device and method for authorizing a user to get access to content stored in encrypted form on a storage medium |
EP1723649A2 (en) * | 2004-03-09 | 2006-11-22 | Matsushita Electric Industrial Co., Ltd. | Content playback device |
DE102004011457B4 (de) * | 2004-03-09 | 2020-03-05 | Siemens Aktiengesellschaft | Aktor und Verfahren zum Betreiben eines Aktors |
JP4595361B2 (ja) * | 2004-03-19 | 2010-12-08 | 株式会社日立製作所 | コンテンツの記録・再生装置及びシステム |
FR2867868A1 (fr) * | 2004-03-19 | 2005-09-23 | Tan Truyen Tran | Procede de protection de logiciels et de donnees avec methode de gestion de clefs securisees |
JP2005301333A (ja) * | 2004-04-06 | 2005-10-27 | Hitachi Global Storage Technologies Netherlands Bv | 利用時間制限機能を備えた磁気ディスク装置 |
US20050273629A1 (en) * | 2004-06-04 | 2005-12-08 | Vitalsource Technologies | System, method and computer program product for providing digital rights management of protected content |
US20050283828A1 (en) * | 2004-06-16 | 2005-12-22 | Perley Tim E | Multipurpose media access data processing system |
US20050283600A1 (en) * | 2004-06-16 | 2005-12-22 | Advanced Micro Divces, Inc. | System for managing a plurality of multipurpose media access data processing systems |
JP2006033326A (ja) * | 2004-07-15 | 2006-02-02 | Toshiba Corp | 記憶媒体処理方法、記憶媒体処理装置及びプログラム |
WO2006009210A1 (ja) * | 2004-07-21 | 2006-01-26 | Sony Corporation | コンテンツ処理装置,コンテンツ処理方法およびコンピュータプログラム |
US7934266B2 (en) * | 2004-07-21 | 2011-04-26 | Sony Corporation | Contents reproduction device, contents reproduction control method, program |
RU2327233C2 (ru) * | 2004-07-21 | 2008-06-20 | Сони Корпорейшн | Система передачи данных, устройство обработки содержания и способ передачи данных |
US7877328B2 (en) * | 2004-07-21 | 2011-01-25 | Sony Corporation | Communication system communication method, contents processing device, and computer program |
JP4700322B2 (ja) * | 2004-07-30 | 2011-06-15 | 株式会社富士通ソーシアルサイエンスラボラトリ | 簡易媒体使用管理システム、簡易媒体使用管理方法、簡易媒体使用管理プログラムおよび簡易媒体使用プログラム |
JP2006053703A (ja) * | 2004-08-11 | 2006-02-23 | Hitachi Ltd | 記憶制御システム及び方法 |
US7716243B2 (en) * | 2005-02-25 | 2010-05-11 | Microsoft Corporation | Provisions for validating content using a content registration authority |
JP2006254137A (ja) * | 2005-03-11 | 2006-09-21 | Nec Corp | ユーザ端末管理装置とユーザ端末管理プログラム及びユーザ端末管理システム |
JP2006285607A (ja) * | 2005-03-31 | 2006-10-19 | Sony Corp | コンテンツ情報提供システム,コンテンツ情報提供サーバ,コンテンツ再生装置,コンテンツ情報提供方法,コンテンツ再生方法,およびコンピュータプログラム |
US7890598B2 (en) * | 2005-03-31 | 2011-02-15 | Sony Corporation | Remote access management |
DE102005022019A1 (de) * | 2005-05-12 | 2007-02-01 | Giesecke & Devrient Gmbh | Sichere Verarbeitung von Daten |
US20060267808A1 (en) * | 2005-05-24 | 2006-11-30 | Imation Corp. | Secure drive system enabled by matching media code |
CA2550560C (en) * | 2005-06-17 | 2015-07-21 | Kabushiki Kaisha Toshiba | Information provision system, provision information copying device, user terminal device and user management device |
JP2007140807A (ja) * | 2005-11-17 | 2007-06-07 | Brother Ind Ltd | リムーバブルメディア装置、リムーバブルメディア装置制御プログラムおよびリムーバブルメディア装置制御方法 |
JP2007148736A (ja) * | 2005-11-28 | 2007-06-14 | Brother Ind Ltd | リムーバブルメディア装置およびリムーバブルメディア装置制御プログラム |
JP2007148721A (ja) * | 2005-11-28 | 2007-06-14 | Brother Ind Ltd | リムーバブルメディア装置、リムーバブルメディア装置制御プログラムおよびリムーバブルメディア装置制御方法 |
DE112006002825B4 (de) * | 2005-12-26 | 2011-12-08 | Mitsubishi Electric Corp. | Content-Verteilsystem, Endgerät und Server |
TW200729065A (en) * | 2006-01-26 | 2007-08-01 | Power Quotient Int Co Ltd | A digital content purchase and copy protection method and its method |
NZ572902A (en) * | 2006-05-08 | 2011-01-28 | Hui Lin | Encrypting and decrypting a memory card with supplementary encryption |
KR100710271B1 (ko) * | 2006-05-10 | 2007-04-20 | 엘지전자 주식회사 | 외부기기와 티브이의 데이터 재생 방법 및 장치 |
US20070268298A1 (en) * | 2006-05-22 | 2007-11-22 | Alben Jonah M | Delayed frame buffer merging with compression |
TW200820131A (en) * | 2006-05-22 | 2008-05-01 | Nvidia Corp | Frame buffer merging |
JP4872512B2 (ja) * | 2006-08-02 | 2012-02-08 | ソニー株式会社 | 記憶装置、記憶制御方法、並びに、情報処理装置および方法 |
JP2008103844A (ja) * | 2006-10-17 | 2008-05-01 | Toshiba Corp | 再生装置および鍵管理方法 |
JP2008131149A (ja) * | 2006-11-17 | 2008-06-05 | Toshiba Corp | コンテンツ配信システム、コンテンツサーバ、及びコンテンツ配信用プログラム |
JP2008132101A (ja) * | 2006-11-28 | 2008-06-12 | Konica Minolta Medical & Graphic Inc | 医用画像管理システム、医用画像管理装置及びプログラム |
US8532300B1 (en) * | 2007-02-13 | 2013-09-10 | Emc Corporation | Symmetric is encryption key management |
JP5138359B2 (ja) * | 2007-12-27 | 2013-02-06 | エヌ・ティ・ティ アイティ株式会社 | リモートアクセス方法 |
JP2009027557A (ja) * | 2007-07-20 | 2009-02-05 | Toshiba Corp | コンテンツデータ配信端末、及びコンテンツデータ配信システム |
US8189794B2 (en) * | 2008-05-05 | 2012-05-29 | Sony Corporation | System and method for effectively performing data restore/migration procedures |
JP2009284019A (ja) * | 2008-05-19 | 2009-12-03 | Panasonic Corp | メディア処理装置及び記録媒体制御方法 |
JP2010045535A (ja) * | 2008-08-11 | 2010-02-25 | Buffalo Inc | 暗号キー管理システム、外部機器及び暗号キー管理プログラム |
KR20100055882A (ko) * | 2008-11-18 | 2010-05-27 | 삼성전자주식회사 | 컨텐츠 제어 장치 및 컨텐츠 제어 방법 |
US20100262963A1 (en) * | 2009-04-09 | 2010-10-14 | Gary Michael Wassermann | Systems and methods for activating a network appliance |
US9083685B2 (en) * | 2009-06-04 | 2015-07-14 | Sandisk Technologies Inc. | Method and system for content replication control |
AU2010258234B2 (en) * | 2009-06-11 | 2015-02-05 | Safend Ltd. | System and method for protecting information and related encryption keys |
JP5440053B2 (ja) * | 2009-09-14 | 2014-03-12 | ソニー株式会社 | 情報処理装置及び情報処理方法、並びにコンピューター・プログラム |
US9530189B2 (en) | 2009-12-31 | 2016-12-27 | Nvidia Corporation | Alternate reduction ratios and threshold mechanisms for framebuffer compression |
JP5750596B2 (ja) * | 2010-02-25 | 2015-07-22 | パナソニックIpマネジメント株式会社 | 管理装置及び複製装置 |
WO2011146898A2 (en) | 2010-05-21 | 2011-11-24 | Bologh Mark J | Internet system for ultra high video quality |
US9197407B2 (en) | 2011-07-19 | 2015-11-24 | Cyberlink Corp. | Method and system for providing secret-less application framework |
US9607407B2 (en) | 2012-12-31 | 2017-03-28 | Nvidia Corporation | Variable-width differential memory compression |
US9591309B2 (en) | 2012-12-31 | 2017-03-07 | Nvidia Corporation | Progressive lossy memory compression |
US10043234B2 (en) | 2012-12-31 | 2018-08-07 | Nvidia Corporation | System and method for frame buffer decompression and/or compression |
JP5980771B2 (ja) * | 2013-12-27 | 2016-08-31 | 京セラドキュメントソリューションズ株式会社 | 画像処理システム及びログ記録方法 |
JP2015207054A (ja) * | 2014-04-17 | 2015-11-19 | 船井電機株式会社 | コンテンツ管理システムおよびコンテンツ管理システムの制御方法 |
JP2015207084A (ja) * | 2014-04-18 | 2015-11-19 | 株式会社日立製作所 | 教育管理システム及びサーバ |
US9832388B2 (en) | 2014-08-04 | 2017-11-28 | Nvidia Corporation | Deinterleaving interleaved high dynamic range image by using YUV interpolation |
CN107786778B (zh) * | 2016-08-31 | 2021-09-28 | 冲电气工业株式会社 | 图像形成系统 |
KR101828425B1 (ko) * | 2017-01-10 | 2018-03-29 | 주식회사 디알엠인사이드 | 사적 복제를 위한 전자책 보호 시스템 및 방법 |
JP2023031800A (ja) * | 2021-08-25 | 2023-03-09 | 富士フイルム株式会社 | カートリッジ管理装置、カートリッジ管理システム、カートリッジ管理装置の動作方法、及びプログラム |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0997174A (ja) * | 1995-09-28 | 1997-04-08 | Mitsubishi Electric Corp | ネットワーク上のライセンス管理システム |
JPH09134330A (ja) * | 1995-11-07 | 1997-05-20 | Fujitsu Ltd | セキュリティ保護システム |
JPH1083297A (ja) | 1996-05-20 | 1998-03-31 | Fujitsu Ltd | ソフトウェアコピー処理装置、ソフトウェアコピー処理方法およびソフトウェアをコピーするプログラムを記録したコンピュータ読み取り可能な記録媒体 |
JP2000305853A (ja) * | 1999-04-22 | 2000-11-02 | Victor Co Of Japan Ltd | コンテンツ情報記録方法及びコンテンツ情報処理装置 |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS6483297A (en) * | 1987-09-26 | 1989-03-29 | Juki Kk | Method for interconnecting clothes in sewing machine |
JPH0934841A (ja) * | 1995-07-21 | 1997-02-07 | Fujitsu Ltd | 記憶媒体のオンライン暗号解除システムおよび方法 |
JP3507594B2 (ja) | 1995-07-31 | 2004-03-15 | 株式会社東芝 | コンピュータ |
JP3688356B2 (ja) * | 1995-08-31 | 2005-08-24 | 富士通株式会社 | ライセンシー通知システム |
JPH09134311A (ja) | 1995-11-07 | 1997-05-20 | Fujitsu Ltd | 機密保護システム |
US5857021A (en) * | 1995-11-07 | 1999-01-05 | Fujitsu Ltd. | Security system for protecting information stored in portable storage media |
US5805699A (en) * | 1996-05-20 | 1998-09-08 | Fujitsu Limited | Software copying system |
JPH10107787A (ja) * | 1996-09-27 | 1998-04-24 | Mitsubishi Corp | データ管理システム |
JP3625983B2 (ja) * | 1997-03-12 | 2005-03-02 | 三菱商事株式会社 | データ管理システム |
JP4545240B2 (ja) * | 1997-04-30 | 2010-09-15 | インターシア ソフトウェア エルエルシー | データコンテンツ流通システム |
JP4053628B2 (ja) * | 1997-06-13 | 2008-02-27 | インターシア ソフトウェア エルエルシー | 電子透かしを利用するデジタルコンテンツ管理システム |
TW393331B (en) * | 1998-05-14 | 2000-06-11 | Sega Enterprises Kk | Information processing device,information processing method, information storage media and information processing system |
JP2000285027A (ja) | 1999-03-29 | 2000-10-13 | Matsushita Electric Ind Co Ltd | キャッシュ装置、送信装置及びプログラム記録媒体 |
JP3553847B2 (ja) * | 1999-03-12 | 2004-08-11 | 松下電器産業株式会社 | コンテンツ複製システム、ドライブ装置、複製方法及びコンピュータ読取可能な記録媒体 |
JP3701148B2 (ja) * | 1999-07-28 | 2005-09-28 | 株式会社日立製作所 | コンテンツの配信方法 |
JP4219680B2 (ja) * | 2000-12-07 | 2009-02-04 | サンディスク コーポレイション | 不揮発性メモリカード、コンパクトディスクまたはその他のメディアから記録済みのオーディオ、ビデオまたはその他のコンテンツを再生するためのシステム、方法およびデバイス |
JP3970040B2 (ja) * | 2001-01-31 | 2007-09-05 | 株式会社ソニー・コンピュータエンタテインメント | コンピュータシステム及びその使用方法 |
-
2002
- 2002-02-19 JP JP2002041890A patent/JP2002328846A/ja active Pending
- 2002-02-20 US US10/079,935 patent/US7178037B2/en not_active Expired - Lifetime
- 2002-02-20 WO PCT/JP2002/001452 patent/WO2002067256A1/ja active Application Filing
- 2002-02-20 EP EP02712466.8A patent/EP1363284B1/en not_active Expired - Lifetime
- 2002-02-20 TW TW091102899A patent/TWI223200B/zh not_active IP Right Cessation
- 2002-02-20 KR KR10-2003-7002467A patent/KR20030069985A/ko not_active Application Discontinuation
- 2002-02-20 AU AU2002232248A patent/AU2002232248B2/en not_active Ceased
- 2002-02-20 CN CN028021444A patent/CN1479921B/zh not_active Expired - Lifetime
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0997174A (ja) * | 1995-09-28 | 1997-04-08 | Mitsubishi Electric Corp | ネットワーク上のライセンス管理システム |
JPH09134330A (ja) * | 1995-11-07 | 1997-05-20 | Fujitsu Ltd | セキュリティ保護システム |
JPH1083297A (ja) | 1996-05-20 | 1998-03-31 | Fujitsu Ltd | ソフトウェアコピー処理装置、ソフトウェアコピー処理方法およびソフトウェアをコピーするプログラムを記録したコンピュータ読み取り可能な記録媒体 |
JP2000305853A (ja) * | 1999-04-22 | 2000-11-02 | Victor Co Of Japan Ltd | コンテンツ情報記録方法及びコンテンツ情報処理装置 |
Non-Patent Citations (6)
Title |
---|
EDA, IMAI: "Pasocon ID sengen", NIKKEI ELECTRONICS, NIKKEI BUSINESS PUBLICATIONS, INC., no. 740, 5 April 1999 (1999-04-05), pages 97 - 113, XP002952609 * |
FOLEY MARY: "Microsoft and piracy, Try, try again", ZDNET NEWS, 11 January 2001 (2001-01-11), XP002952610, Retrieved from the Internet <URL:http://zdnet.com.com/2100-11-527150.html> [retrieved on 20020507] * |
FOLEY MARY: "Whistler shin beta ban, interface kairyo shi iho copy boshi no shinkino mo", ZDNET JAPAN, 9 January 2001 (2001-01-09), XP002952611, Retrieved from the Internet <URL:http://zdnet.co.jp/news/0101/09/e_whistler.html> [retrieved on 20020507] * |
MOTOIKE, KIYONO: "DVD o mochiita contents ryutsu service", MATSUSHITA TECHNICAL JOURNAL, MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD., vol. 44, no. 5, 18 October 1998 (1998-10-18), pages 25 - 33, XP002952612 * |
See also references of EP1363284A4 |
YOSHIO: "Kogata memory card de ongaku chosakuken o mamoru", NIKKEI ELECTRONICS, NIKKEI BUSINESS PUBLICATIONS, INC., no. 739, 22 March 1999 (1999-03-22), pages 49 - 53, XP002952608 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100353787C (zh) * | 2004-06-23 | 2007-12-05 | 华为技术有限公司 | 一种移动终端内存储的资料信息的安全保障方法 |
Also Published As
Publication number | Publication date |
---|---|
TWI223200B (en) | 2004-11-01 |
EP1363284A4 (en) | 2007-08-08 |
EP1363284A1 (en) | 2003-11-19 |
US20020114461A1 (en) | 2002-08-22 |
CN1479921B (zh) | 2011-10-05 |
KR20030069985A (ko) | 2003-08-27 |
US7178037B2 (en) | 2007-02-13 |
CN1479921A (zh) | 2004-03-03 |
AU2002232248B2 (en) | 2006-11-30 |
EP1363284B1 (en) | 2017-11-29 |
JP2002328846A (ja) | 2002-11-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2002067256A1 (fr) | Systeme de gestion de copie de programme informatique | |
US7934266B2 (en) | Contents reproduction device, contents reproduction control method, program | |
JP4305593B2 (ja) | データ記録再生方法および装置、データ記録装置および方法 | |
JP3696206B2 (ja) | 一意義的にのみ存在が許容される独自データを復元可能なデータ記録装置 | |
JP4622082B2 (ja) | データ再生装置、データ記録装置、およびデータ再生方法、データ記録方法、リスト更新方法、並びにプログラム提供媒体 | |
TW522336B (en) | Work management method and work management device | |
KR100729901B1 (ko) | 리보케이션 정보 갱신 방법, 리보케이션 정보 갱신 장치및 기억매체 | |
US20060129819A1 (en) | Semiconductor memory card and data reading apparatus, and data reading/reproducing apparatus | |
US20020136405A1 (en) | Data recording device allowing obtaining of license administration information from license region | |
KR20040030454A (ko) | 콘텐츠 이용권한 관리시스템, 콘텐츠 이용권한 관리방법및 정보처리장치와 컴퓨터 프로그램 | |
JP2002073421A (ja) | ライセンス発行装置、コンテンツ再生装置、ライセンス発行方法、およびコンテンツ再生方法 | |
JP2005523487A (ja) | リチャージ可能なメディア配布/再生システム | |
MXPA06010778A (es) | Estructura de manejo de derechos digitales, dispositivo de almacenamiento portatil y metodo de manejo de contenidos que usa el dispositivo de almacenamiento portatil. | |
KR20070043688A (ko) | 통신시스템, 통신방법, 콘텐츠 처리장치, 및 컴퓨터프로그램 | |
US20050078822A1 (en) | Secure access and copy protection management system | |
JP5209945B2 (ja) | 記憶装置、暗号化コンテンツの有効化方法及び端末装置 | |
JP2006127485A (ja) | コンテンツ再生装置およびコンテンツ再生方法 | |
KR20040101011A (ko) | 데이터 부정 사용 방지 시스템 | |
JP4110511B2 (ja) | コンテンツ利用管理システム、情報処理装置、および方法、並びにコンピュータ・プログラム | |
JP3788572B2 (ja) | レンタルコンテンツ流通システムおよびその方法 | |
JP2002099509A (ja) | 携帯端末装置 | |
JP2005507195A (ja) | エンティティ・ロックされたセキュア・レジストリを用いて素材にアクセスする装置及び方法 | |
JP5023621B2 (ja) | コンテンツ管理システム | |
JP4674396B2 (ja) | データ再生装置、データ記録装置、およびデータ再生方法、データ記録方法、並びにプログラム提供媒体 | |
JP2007156508A (ja) | 再生端末、コンテンツ保管装置及びコンテンツ配信システム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AU BR CA CN IN KR MX NZ RU SG |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
REEP | Request for entry into the european phase |
Ref document number: 2002712466 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2002712466 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 028021444 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020037002467 Country of ref document: KR Ref document number: 2002232248 Country of ref document: AU |
|
WWP | Wipo information: published in national office |
Ref document number: 1020037002467 Country of ref document: KR |
|
WWP | Wipo information: published in national office |
Ref document number: 2002712466 Country of ref document: EP |