Contents recorder/reproducer

Abstract
A unidirectional function circuit generates a first encryption key according to the device identification information stored in a device identification information holding unit. Another unidirectional function circuit generates a second encryption key that depends on a write block address. A contents key generator generates a contents key using the first encryption key, second encryption key, and relation information. An encryptor records contents, which are encrypted using the contents key, onto a HDD.
Description


BACKGROUND OF THE INVENTION

[0001] 1. Field of the Invention


[0002] The present invention relates to a contents recorder/reproducer that can protect contents that are recorded and reproduced.


[0003] 2. Description of the Related Art


[0004] Although a digitized audio-visual work called contents has conventionally been difficult to handle because of its large size, a recent advance in the high-density recording/reproduction technology makes contents distribution more popular.


[0005] One of the merits of digitization is that information is not degraded even if copied. On the other hand, an infringement of a reproduction right through illegal copies has become evident.


[0006] Contents encryption is efficient for preventing illegal copies.


[0007] For example, when recorded on a digital video disc (DVD), video information is encrypted to prevent it from being reproduced unless the information is decrypted using a predetermined procedure.


[0008] In this type of encryption, contents to be recorded are encrypted in advance using, for example, predetermined key information. In general, a sequence of synchronous blocks, each with a predetermined length, is formed on a recording medium such as a DVD and the encrypted contents are recorded in units of synchronous blocks. Each synchronous block has a block address that uniquely identifies the synchronous block. The block address is recorded in advance at the start of each synchronous block.


[0009] Contents are recorded on, or reproduced from, a recording medium, for example, by the micro-controller and the file system software that control the whole recorder/reproducer.


[0010] When contents are recorded, encrypted contents are divided into synchronous blocks and are sequentially recorded while searching the block management table on the recording medium for synchronous blocks into which contents may be written. A similar procedure is used to record key information, which is used to encrypt the contents, on the recording medium.


[0011] When contents are reproduced from a recording medium, the same key information as that used for encryption is used for decryption. To do so, the key information recorded in advance on the recording medium is read and the key information that was read is used to decrypt contents read from the synchronous blocks.


[0012] The encryption technology described above encrypts contents to be recorded on a recording medium and hides the key information and the encryption algorithm to prevent the contents, read from the recording medium, from being copied to another recording medium.


[0013] However, if the encryption algorithm is analyzed and the key information is read from the recording medium, the encryption technology described above cannot prevent the contents from being copied.


[0014] In addition, the contents such as those described above are large in size, meaning that there is a large amount of data encrypted with a single key from the viewpoint of encryption algorithm analysis. Therefore, it is required to make the analysis of the algorithm more difficult.


[0015] Another disadvantage in using a single key for encrypting the whole contents is that, once the encryption algorithm is known, the whole contents may be decrypted by the single key.



SUMMARY OF THE INVENTION

[0016] In view of the foregoing, it is an object of the present invention to provide a contents recorder/reproducer that can prevent contents from being copied.


[0017] To achieve the above object, there is provided a contents recorder/reproducer recording contents on a recording medium and reproducing the recorded contents, comprising: encryption key generating means that uses first key information common to a plurality of recording blocks on the recording medium and second key information unique to each recording block to generate an encryption key used for encrypting contents of each the recording block.


[0018] In a preferred embodiment of the present invention, the second key information is encryption key information depending upon address information on each recording block, the recorder/reproducer further comprising: recording means for recording a part or all of relation information on the recording medium, the relation information being information on a relation between the address information and the encryption key information.


[0019] In a preferred embodiment of the present invention, the first key information is encryption key information corresponding to identification information unique to each contents recorder/reproducer.


[0020] In a preferred embodiment of the present invention, the recording means records the relation information in an area separate from an area in which the address information on the recording blocks and the encrypted contents are recorded.


[0021] As described above, the encryption key generation means of the contents recorder/reproducer uses the first key information common to a plurality of recording blocks on a recording medium and the second key information about each recording block to generate an encryption key for encrypting the contends of each recording block. The generated encryption key is used to encrypt the contents to be recorded on the recording medium. The contents encrypted using these encryption keys are recorded in a predetermined block on the recording medium.


[0022] The nature, principle and utility of the invention will become more apparent from the following detailed description when read in conjunction with the accompanying drawings.







BRIEF DESCRIPTION OF THE DRAWINGS

[0023] In the accompanying drawings:


[0024]
FIG. 1 is a diagram showing the configuration of a recorder/reproducer in an embodiment of the present invention;


[0025]
FIG. 2 is a block diagram showing the configuration of a unidirectional function circuit included in the recorder/reproducer;


[0026]
FIG. 3 is a block diagram showing the configuration of a contents key generator included in the recorder/reproducer;


[0027]
FIG. 4 is a block diagram showing the configuration of a mapping processor included in the contents key generator; and


[0028]
FIG. 5 is a diagram showing an example of a block management table for managing data to be recorded on an HDD included in the recorder/reproducer.







DESCRIPTION OF THE PREFERRED EMBODIMENTS

[0029] The present invention may be applied to a recorder/reproducer, such as a hard disk recorder, that can record and reproduce video or other contents to and from a recording medium such as a hard disk drive (HDD). (Configuration)


[0030] A recorder/reproducer in one embodiment of the present invention comprises an encryption unit 10 and a decryption unit 20 as shown in FIG. 1. The encryption unit 10 encrypts contents to be recorded on contents-storing recording means 1 (hereinafter simply called an HDD) such as a hard disk drive (HDD) that uses magnetic disks as recording media. The decryption unit 20 decrypts contents read from the HDD 1.


[0031] The recorder/reproducer further comprises a tuner 2 that receives programs sent via digital broadcasting such as satellite digital broadcasting and outputs the contents thereof and a selector 3 that selects contents information received from an external input terminal or contents information from the tuner 2. Contents such as compressed video information are sent via satellite digital broadcasting, and the tuner 2 decompresses received contents and sends the decompressed results to the selector 3. The selector 3 also receives uncompressed contents from the external terminal.


[0032] To compress uncompressed contents, the recorder/reproducer has a compression unit 4 that compresses contents received via the selector 3 and sends the compressed results to the encryption unit 10. The compression unit 4 compresses received video information, audio information, and so on using, for example, the MPEG (Moving Picture Experts Group)-2 standard and sends the compressed result to the encryption unit 10.


[0033] The recorder/reproducer further comprises a device identification information holding unit 5 that holds identification information (for example, device identification number) unique to each device, an input/output controller 6 that controls the recording of contents encrypted by the encryption unit 10 onto the HDD 1, an input/output controller 7 that controls the reading of encrypted contents from the HDD 1, a decompression unit 8 that decompresses the contents read from the HDD 1 and decrypted by the decryption unit 20, an instruction receiver 40 that receives an instruction from the user, and a controller 50 that control the whole device.


[0034] Preferably, the device identification information holding unit 5 has a configuration that makes it difficult to change or read device identification information held in this unit. For example, this unit may be provided in the ROM in the IC package of the controller 50.


[0035] The encryption unit 10 comprises a unidirectional function circuit 11 that generates an encryption key (first encryption key [first key information]) corresponding to the device identification information held in the device identification information holding unit 5, a unidirectional function circuit 12 that generates an encryption key (second encryption key [second key information]) according to the recording position (write block address) of contents information controlled by the input/output controller 6, a relation information generator 13 that generates information according to the generation method of an encryption key, a contents key generator (encryption key generation means) 14 that generates an encryption key (contents key) used to encrypt contents information according to the encryption keys generated by the unidirectional function circuits 11 and 12, and an encryptor 15 that encrypts contents information using an encryption key generated by the contents key generator 14.


[0036] The decryption unit 20 comprises a unidirectional function circuit 21 that generates an encryption key (first encryption key) corresponding to the device identification information held in the device identification information holding unit 5, a unidirectional function circuit 22 that generates an encryption key (second encryption key) according to the reproduction position (read block address) of contents information controlled by the input/output controller 7, a contents key generator 23 that generates an encryption key (contents key) used to encrypt contents information according to the encryption keys generated by the unidirectional function circuits 21 and 22, and a decryptor 24 that decrypts contents information encrypted using the encryption key generated by the contents key generator 23.


[0037] Each unidirectional function circuit 11 (12, 21, 22) has a feature that it is difficult to estimate an input value based on an output value. These unidirectional function circuits output data (output value) uniquely determined for input data (input value) according to a known procedure such as the DES (Data Encryption Standard) method, one of block encryption methods. To implement this function, the unidirectional function circuit 11 has a block encryption circuit 11a such as the one shown in FIG. 2. The block encryption circuit performs transposition and inversion for an input data string according to a pre-set encryption key to encrypt the input data string.


[0038] The unidirectional function circuit 11 may also be configured so that it can execute processing other than block encryption. In such a case, the unidirectional function circuit 11 has a circuit for desired processing instead of the block encryption circuit 11a.


[0039] The relation information generator 13, provided for preventing the contents key generator 14 from executing monotonous encryption, generates a sequence of random numbers and sends the generated sequence to the contents key generator 14.


[0040] In response to the received sequence, the contents key generator 14 changes the operation algorithm for generating a contents key. To implement this function, the contents key generator 14 comprises a mapping processor 14a and a bit replacement circuit 14b as shown in FIG. 3. The mapping processor 14a determines the correspondence relation (mapping) between the second encryption key and the output value according to the relation information (sequence) received from the relation information generator 13. The bit replacement circuit 14b generates a contents key from the first encryption key and the output value of the mapping processor 14a.


[0041] More specifically, the mapping processor 14a comprises a table 141 and a mapping circuit 142 as shown in FIG. 4. The table 141 contains an operation algorithm corresponding to each unit of relation information. The mapping circuit 142 calculates an output value corresponding to the second encryption key according to the operation algorithm selected by the relation information received from the relation information generator 13. The table 141 contains, for example, a bit string (ai [i=0, 1, 2, . . . , 7]) corresponding to each unit of relation information. For example, the mapping circuit 142 uses the expression below to calculate an output value Z(x) from the bit string ai selected according to the relation information received from the relation information generator 13 and the second encryption key Y(x).
1Y(x)·xn=P(x)·Q(x)+Z(x)Q(x)=i=07aixi


[0042] By calculating the output value Z corresponding to the second encryption key according to the relation information generated by the relation information generator 13, the output value Z corresponding to the same block address may be varied according to the relation information. By generating the contents key using the output value Z generated in this way and the first encryption key, it becomes difficult to analyze the recorded contents that have been encrypted by the contents key.


[0043] (Synchronous block)


[0044] Synchronous blocks (recording blocks), each with a predetermined length, are formed on the recording medium of the HDD 1 as shown in FIG. 1 described above. Data such as contents recorded on the HDD 1 is recorded in units of blocks.


[0045] Identification information (block address=0, 1, 2, . . . ) is allocated to each synchronous block, and the block address is recorded at the start of the synchronous block. At recording or reproduction time, this block address is used to uniquely identify a synchronous block to be recorded or reproduced.


[0046] A block management table is also recorded in a predetermined synchronous block (for example, the block at block address 0) to store which contents are recorded in which block.


[0047] As shown in FIG. 5, this block management table stores the block address of the start position of each contents recording area (recording start address) and the number (size) of blocks used.


[0048] When recording contents, the input/output controller 6 references the block management table to find a free area, records contents there, and updates the block management table.


[0049] When reproducing contents, the input/output controller 7 references the block management table, obtains the recording position of the contents to be reproduced, and reproduces the contents.


[0050] This block management table is used for usual input/output operations. On the other hand, the input/output controller 6 records the relation information, which is generated by the relation information generator 13, in an area not referenced via the block management table.


[0051] Recording the relation information in such an area prevents the relation information from being copied with encrypted contents information. In addition, because a general input/output device cannot directly access the relation information, the possibility that the relation information will be copied is reduced. It is also possible not to store the address of the synchronous block, in which the relation information is recorded, in the block management table described above. This will easily increase confidentiality.


[0052] (Second Encryption Key)


[0053] The second encryption key is generated as follows. First, the input/output controller 6 determines a synchronous block in which contents will be recorded and sends the address of the synchronous block (write block address) to the unidirectional function circuit 12. Then the unidirectional function circuit 12 generates the second encryption key.


[0054] (Recording Operation)


[0055] When the user operates the instruction receiver 40 to select contents to be recorded (for example, contents received from the tuner 2 or contents received from an external terminal), the controller 50 of the recorder/reproducer with the above configuration causes the selector 3 to select user-selected contents and sends the selected contents to the compression unit 4.


[0056] The compression unit 4 compresses the received contents using, for example, the MPEG-2 method described above and sends the result to the encryption unit 10.


[0057] The relation information generator 13 generates relation information according to an instruction from the controller 50. This relation information is sent to the mapping circuit 142 of the contents key generator 14.


[0058] On the other hand, the input/output controller 6 references the block management table to determine the recording position of the contents compressed by the compression unit 4. This recording position is sent to the unidirectional function circuit 12 as the write block address of the block. In accordance with the received write block address, the unidirectional function circuit 12 generates a second encryption key and sends the generated second key to the contents key generator 14.


[0059] The contents key generator 14 also receives a first encryption key generated by the unidirectional function circuit 11 that receives the device identification information from the device identification information holding unit 5. In response to the second encryption key, the contents key generator 14 generates the contents key according to the first encryption key, second encryption key, and relation information and sends the generated contents key to the encryptor 15.


[0060] The encryptor 15 encrypts the contents received from the compression unit 4, a predetermined length of contents at a time (length corresponding to the synchronous block length described above), using the contents key received from the contents key generator 14 and sends the encrypted contents to the input/output controller 6.


[0061] The input/output controller 6 records the contents received from the encryptor 15 onto the HDD 1, one synchronous block at a time.


[0062] Because the contents key differs between synchronous blocks as described above, the contents recorded in a synchronous block are encrypted by an encryption key (contents key) unique to that synchronous block and then recorded on the HDD 1.


[0063] After recording the encrypted contents on the HDD 1 as described above, the input/output controller 6 updates the block management table. At the same time, the input/output controller 6 records the relation information, generated by the relation information generator 13, in a predetermined synchronous block on the HDD 1.


[0064] (Reproduction Operation)


[0065] When the user who wants to reproduce contents operates the instruction receiver 40 to select contents to be reproduced, the input/output controller 7 starts reading the selected contents from the HDD 1.


[0066] First, the input/output controller 7 reads the relation information from the predetermined area on the HDD 1 and sends the relation information to the contents key generator 23.


[0067] Next, the input/output controller 7 references the block management table to find the synchronous block in which the selected contents are recorded and reads the encrypted contents from that synchronous block.


[0068] At the same time, the input/output controller 7 sends information on the synchronous block (read block address), from which the contents are being read, to the unidirectional function circuit 22.


[0069] The contents key generator 23 also receives a first encryption key generated by the unidirectional function circuit 21 that receives the device identification information from the device identification information holding unit 5. In response to the second encryption key, the contents key generator 23 generates the contents key according to the first encryption key, second encryption key, and relation information and sends the generated contents key to the decryptor 24.


[0070] The decryptor 24 decrypts the encrypted contents, received from the input/output controller 7, using the contents key received from the contents key generator 23 and sends the decrypted contents to the decompression unit 8. In this way, the contents encrypted by the contents key that differs between synchronous blocks may be decrypted.


[0071] The decompression unit 8 decompresses the received contents and sends them to a device such as a monitor via the external output terminal.


[0072] (Effects)


[0073] As described above, this recorder/reproducer uses the encryption key (first encryption key) unique to the device and the encryption key (second encryption key) that depends on the recording position on the recording means (HDD 1), on which the contents are to be recorded, to generate an encryption key for encrypting the contents to be recorded. Therefore, even if the user removes the recording means from the device and tries to reproduce the contents from the recording means on another device, the contents cannot be decrypted because the first encryption key differs from that of the original device. In addition, even if the user copies contents to some other recording means in some way or other, it is virtually impossible to decrypt the contents because the original recording position information is lost. Thus, this recorder/reproducer prevents a copy of the contents from being made.


[0074] (Modification)


[0075] Although, in the above description, the contents key generator 14 receives a sequence of random numbers from the relation information generator 13 to change the contents key generation algorithm, the mapping processor 14a and relation information generator 13 are not necessary if the contents key generated by the first key information and the second key information meet the need. In addition, the configuration of the recorder/reproducer may be changed as necessary within the scope of the technological concept of the present invention.


[0076] As described above, the encryption key generation means of the contents recorder/reproducer according to the present invention uses the first key information common to a plurality of recording blocks on a recording medium and the second key information about each recording block to generate an encryption key for encrypting the contends of each recording block. The generated encryption key is used to encrypt the contents to be recorded on the recording medium. The encrypted contents are recorded in a predetermined block on the recording medium.


[0077] In this way, the contents to be recorded on the recording medium are encrypted using the encryption key that differs between recording blocks. The size of a recording block on the recording medium is very small as compared with the size of the contents. This means that the contents are divided into a very large number of recording blocks for recording and that a very large number of encryption keys are used for encrypting the whole contents. The recorded contents cannot be restored unless all key information is known. Therefore, this contents recorder/reproducer prevents a copy of the contents from being made by making it difficult to reproduce the contents unless all key information is available.


[0078] In addition, if identification information unique to each contents recorder/reproducer or information dependent on this identification information is used as the first key information and if this first key information is not recorded on the recording medium, the reproduction of the contents illegally read from the recording medium becomes even more difficult.


[0079] It should be understood that many modifications and adaptations of the invention will become apparent to those skilled in the art and it is intended to encompass such obvious modifications and changes in the scope of the claims appended hereto.


Claims
  • 1. A contents recorder/reproducer recording contents on a recording medium and reproducing the recorded contents, comprising: encryption key generating means that uses first key information common to a plurality of recording blocks on the recording medium and second key information unique to each recording block to generate an encryption key used for encrypting contents of each said recording block.
  • 2. The contents recorder/reproducer according to claim 1 wherein the second key information is encryption key information depending upon address information on each recording block, further comprising: recording means for recording a part or all of relation information on the recording medium, said relation information being information on a relation between the address information and the encryption key information.
  • 3. The contents recorder/reproducer according to claim 1 wherein the first key information is encryption key information corresponding to identification information unique to each contents recorder/reproducer.
  • 4. The contents recorder/reproducer according to claim 2 wherein said recording means records the relation information in an area separate from an area in which the address information on the recording blocks and the encrypted contents are recorded.
Priority Claims (1)
Number Date Country Kind
P2002-010662 Jan 2002 JP