This application is based upon and claims the benefit of priority from prior Japanese Patent Application No. 2003-199349, filed Jul. 18, 2003, the entire contents of which are incorporated herein by reference.
1. Field of the Invention
The present invention relates to content recording method, a recording medium and a content recording device which are used for content encryption for the purpose of protecting a copyright.
Specifically, the present invention relates to a method and a device for recording a content and a recording medium which provide an identification code unique to each read-only recording medium in content encryption for protection of a copyright or the like to enable taking the identification code into an encryption system. Further, the present invention relates to a system which enables introduction of the same encryption system in a read-only medium, a recordable medium of a write-once type, and a rewritable medium in which recording is possible a plurality of times.
2. Description of the Related Art
As disk type media for recording digitized information (e.g., document, sound, image, program and the like), there have conventionally been available a compact disk and a laser disk which are media to record sounds and images. A floppy disk and a hard disk have been available as media to record a program and data of a computer or the like. In addition to such recording media, a DVD (digital versatile disk or digital video disk) which is a large-capacity recording medium has been developed.
In the aforementioned digital recording media of various kinds, digital data (including data which is compressed, encoded or the like, and decodable) is directly recorded at the time of recording. Thus, copying of the recorded data in other media can be easily carried out without losing, e.g., sound quality or image quality. Consequently, a great many copies can be produced to cause a problem of copyright infringement.
Against such a background, the inventors et al., have applied for a patent of copyright protection [e.g., Japanese Patent No. 3093678 (Patent Application No. 9-136709 “ENCRYPTION METHOD, DECRYPTION METHOD, RECORDING/REPRODUCING DEVICE, DECRYPTION DEVICE, DECRYPTION UNIT DEVICE, AND METHOD FOR MANUFACTURING RECORDING MEDIUM”)].
This patent concerns content encryption, a content encryption key, and encryption of the encryption key, and is designed to prevent illegal copying of a content. On the basis of such a technology, a copyright protection system called a content scramble system (CSS) has been introduced to a read-only medium of a DVD video, a DVD audio or the like.
Additionally, a copyright protection system called copy protection for prerecorded media (CPPM) has been employed for a read-only DVD audio disk.
On the other hand, as a content protection system for a recording/reproducing type DVD disk such as a DVD-RAM, DVD-R (recordable) or a DVD-RW (rewritable), a copyright protection system called content protection for recordable media (CPRM) has been employed.
As described above, as recording media such as DVDs, there are various types such as a read-only medium suited to large distribution, a write-once type recordable medium (unrewritable recording medium) which is used as an archive, and a rewritable medium in which recording is freely executed many times. The write-once type is used as an archive and for authoring during read-only medium development. In the copyright protection system in which many kinds of such media are mixed, a plurality of copyright protection systems must be used properly in accordance with use.
As described above with reference to the CPPM system, in the read-only medium, the content is encrypted by one title key selected from a group of random numbers, the title key is encrypted, they are recorded in the same medium, and a great many identical media are manufactured by pressing. As a result, all reproducing devices detect the identical title keys, and decode the encrypted content.
As described above with reference to the CPRM system, in the rewritable medium, a recording/reproducing device that an end user owns encrypts the content to record them in one medium. That is, by making a content encryption key used here unique to the medium, an ability of preventing illegal copying in other media can be provided. Thus, the CPRM system which is a content encryption system in the rewritable medium records media ID different from one medium to another in BCA recorded information, and generates a medium unique key by this media ID code to be used as an encryption key. That is, the encrypted content recorded in each recording medium is media-bound.
An album ID of a read-only medium is unique to an album unit, and an encryption key can be varied only by a master disk unit set on a press machine which produces disks. However, since the recording medium has an encryption key unique to itself, even if the encrypted content and the encrypted title key of the read-only medium are directly recorded in the rewritable medium, media key block MKB are different. Thus, media keys are not identical, and illegal copying is not established.
However, if the write-once type recordable medium for authoring is widespread, whole information of the read-only medium containing the media key block MKB is copied in the other rewritable medium to establish illegal copying. In such illegal copying, no matter how strong encryption is made, the copyright protection system does not function because the content is copied in the encrypted state.
Furthermore, even among the read-only media, in a medium in which information of addition of an interactive function is recorded, there is a demand for adding an identification code for each medium. Especially, a unique number is necessary for each medium in expanded application which uses Internet. In this case, the unique number must be protected, and there is now a demand for a copyright protection system of a total system together with a content protection.
The present invention is directed to a copyright protection system required in a system in which various media of different functions such as a read-only medium, a write-once type recordable medium, and a rewritable medium are present.
According to an embodiment of the present invention, a recording medium comprising:
According to another embodiment of the present invention, a content recording device comprises:
According to another embodiment of the present invention, a content recording method comprises:
Additional objects and advantages of the present invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the present invention.
The objects and advantages of the present invention may be realized and obtained by means of the instrumentalities and combinations particularly pointed out hereinafter.
The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate embodiments of the present invention and, together with the general description given above and the detailed description of the embodiments given below, serve to explain the principles of the present invention in which:
An embodiment of a content recording method, a recording medium, and a content recording device according to the present invention will now be described with reference to the accompanying drawings.
The embodiments of the invention provide independent optimal copyright protection systems for a read-only recording medium, a write-once type recordable medium, and a rewritable medium. However, the protection systems may be configured on the same platform. In the embodiments, a DVD disk will be described as a medium, but other media may be used.
According to the conventional system, since the technology that uses the medium-unique identification code in the read-only medium must generate the common content encryption key, there have only been a few realization examples. There has only been an idea that an identification code different from one medium to another is sent to a management center through a network, and a common encryption key of the target media is transferred to be used for decrypting an encrypted content. However, different from the embodiments of the invention, there have been no examples in which in a closed area of a medium, a unique identification code is incorporated into the copyright protection system irrespective of the read-only medium.
First Embodiment
Upon setting of the disk 103 in which an encrypted content has been recorded on a DVD player 108, the recorded content is decrypted by a content decryption unit 105, and subjected to data decompression at an MPEG decoding unit 106 to be output to the outside as an image signal including a video signal V and an audio signal A.
When the disk 103 is set in a computer, the encrypted content is read by a DVD-ROM drive 107, and the drive 107 and an MPEG decoder module 109 interconnected through a PC bus are authenticated by a bus authentication unit. Then, the encrypted content is transferred from the drive 107 to the MPEG decoder module 109, decrypted by the content decryption unit 105, and subjected to decompression at the MPEG decoding unit 106 to be output as an image signal to the outside.
Regarding the disk key (DK) 202 used to encrypt the title key (TK), an encrypted disk key set Enc-DK_set is generated by a plurality of master key (MK) groups 208 managed by a CSS management organization at a disk key (DK) encryption unit 207 therein to be recorded together with the encrypted content in the disk 103.
A media key (Km) 302 that becomes a base of an encryption key in
Explanation will be made with reference to a decryption process of the CPPM system of
In
In actual decryption, the data read from the media are collected into a 2K-byte Encrypted-Pack 308. Certain data is calculated with the media unique key Kum at a CCI-Pro unit 323 to generate a decryption key of the encrypted data, and decrypted at a decryption unit 324.
The content is encrypted by the title key Kt, and encrypted Enc-Contents and the encrypted title key Ket are recorded.
In the description of the embodiment, explanation will first be made of an example of a copyright protection system in a read-only medium.
A device key processing unit regarded as a master position of a content encryption key is similar to that used in the conventional CPPM/CPRM system or the like. An encrypted media key block MKB is generated based on a plurality of device keys Kd of a device key group 303 and a media key (Km) 302 at a media key block (MKB) generation unit 304. According to the media key block (MKB) system, if data of a device key set (including a plurality of device keys) provided to the player by the copyright protection (CP) system management organization is hacked by an illegal action, the encrypted media key block MKB is changed to prevent detection of the media key Km by all the device keys of the hacked device key set thereafter. Naturally, certain device keys constituting a device key set provided to the other player include hacked device keys, but the media key Km can be extracted by using the other device keys since a plurality of device keys have been set. That is, all the device keys in the device subjected to the illegal action are disabled to execute new media key block (MKB) processing (reproduction process), while reproduction operations can be correctly carried out in the other players.
Thus, the media key block (MKB) system has a function of updating the system, and the system of the embodiment uses this function. In the media key block (MKB) system, the media key block MKB that is an encrypted encryption key group obtained by encrypting a common key (e.g., media key Km) by a plurality of keys is recorded in a medium, and the plurality of keys are distributed to devices or the like. Accordingly, the device that has a key distributed from the group of a plurality of keys can use a function of extracting the common key from the media key block MKB at multistages, whereby a new function and ability improvement can be provided. This system is this embodiment, and will be described with reference to
In the copyright protection (CP) system management organization, a media key KM provided by a copyright holder is encrypted by a device key of a device key group 303 at a media key block (MKB) generation unit 304 to generate a media key block MKB. Similarly, a media unique key Kum provided by the copyright holder is encrypted by using a plurality of media ID's sent from a media ID group 501 which is an group of media identification codes at a media ID block (MIDB) generation unit 504 to generate a media ID block MIDB. A manufacturer of a read-only medium in which a content is encrypted to be recorded receives the media key block MKB and the media ID block MIDB generated in the aforementioned manner from the copyright protection (CP) system management organization, and a necessary number of media ID codes from the media ID group to carry out a content encryption process.
To begin with, a content 100 is encrypted by a title key (TK) 403 to generate an encrypted content. The title key (TK) 403 is encrypted by a media unique key (Kum) 503 to generate an encrypted title key Ket. The content, the title key Ket, the encrypted media key block MKB, and the encrypted media ID block MIDB encrypted in the aforementioned manner, are recorded in a master disk, and media are mass-produced in a reproducing disk manufacturing process.
In the manufactured read-only media, a media ID code different from one medium to another is encrypted by a media key Km to be recorded as an encrypted ID code Keid in a BCA area. In the case of recording in a write-once type recordable medium in an authoring process of the read-only medium, a number unique to each medium is added through such a process, and the unique number becomes indispensable to decryption of the encrypted content. Thus, even if the encrypted content has an encryption key common among albums, a unique number can be added to each medium by using the system of the embodiment.
An operation flowchart of
In step S12, a content is divided into 2 KB packs of encryption process units.
In step S14, data of the packs of 2 KB units is encrypted by a title key TK to be recorded in a data area.
In step S16, the title key TK is encrypted by a media unique key Kum, and an encrypted encryption key Ket is recorded in a specified area.
In step S18, an encrypted media key block MKB (key group in which media key Km is encrypted by device key) and an encrypted media ID block MIDB (key group in which media unique key Kum is encrypted by media ID group) generated in the copyright protection (CP) system management organization are recorded in a lead-in area.
In step S20, a plurality of media ID's provided from the copyright protection (CP) system management organization are encrypted by the media key Km to be recorded in the BCA area for each medium.
According to this system, different device key sets are incorporated in a large number of players from the copyright protection (CP) system management organization. On the other hand, a system that can extract a common media key Km by a media key block MKB has conventionally been used. A system is introduced in which different media identification codes are encrypted to be recorded in a large number of media, an encrypted information group block (media ID block) MIDB is recorded as in the case of the media key block MKB, and a common media unique key is extracted by using the different media identification codes or the MIDB. Thus, it is possible to realize a system which can reproduce a common encryption key even if unique keys are arranged in a plurality of devices and a plurality of media.
Incidentally, as described above, the media ID block MIDB is generated by the copyright protection (CP) system management organization in
To explain encryption strength of the system, in a system that encrypts a common second encryption key by a plurality of such first keys to generate and use an encrypted encryption key group, position data and an encryption key of the encrypted encryption key group are distributed as a pair when the first key is divided to be distributed. Thus, a probability that a specific first key is entirely attacked to be detected is 1/(key length bit number). That is, the media key block MKB function and the media ID block MIDB function may be similar in strength. However, while the device key set is secretly set in the device, the encrypted media ID (Keid) of the media ID block MIDB is encrypted by the media key Km extracted in the media key block (MKB) system. As a result, strength of the entire system depends on a number of key length bits of the device key.
A process flowchart of
In step S22, a drive and an AV decoder board are authenticated.
In step S24, a media key block MKB is read from a lead-in area, and supplied through an authentication unit to the AV decoder board. There, a media key block (MKB) process is executed by using a device key set to extract a media key Km.
In step S26, encrypted media ID (Keid) is read from a BCA area, and decrypted by the media key Km to extract media ID (Kid).
In step S28, a media ID block MIDB is read from the lead-in area, and supplied through the authentication unit to the AV decoder board. There, a media ID block (MIDB) process is executed by using the media ID (Kid) to extract a media unique key Kum.
In step S30, an encrypted title key Ket is read, and decrypted by the media unique key Kum to extract a title key Kt.
In step S32, an encrypted content is decrypted by the title key Kt to reproduce a plaintext content.
Now, methods for generating and decrypting a media key block MKB will be described.
As a method for deriving a common encryption key from a plurality of decryption keys, there is a technology that uses an encrypted encryption key group.
A media key (Km) 121 is encrypted by a device key group 120 including a great many device keys at an encryption unit 122 to generate an encrypted media key group, and this is set as a media key block MKB. The device key group used for the encryption is distributed from a licensing organization of a copyright protection system to a decryption device manufacturer by an individual unit, and an individual device key is set by a decryption device in principle. In this case, device key data set in the decryption device contains key data and position information (position ID) of a media key encrypted based on this key data in the media key block MKB.
In the constitutions of
A brief outline of a media key block generation process of
The media key block MKB comprises a plurality of pages. First, a media key is encrypted at an encryption unit 1220 to generate verify data, and then supplied through a selector (SEL) 134 to an encryption unit 1221. Here, the media key is encrypted by a device key group to generate a media key block MKB-0. In this case, if there is a device key hacked by an offender in the device key group, the selector 134 is controlled at a revoke control unit 135 to change data encrypted at the encryption unit 1221 from a media key 121 to a temporary media key 1 (T-Km1). Not an encrypted media key Km but an encrypted temporary media key 1 (T-Km1) is arranged in a position of the hacked device key. By this process, the media key block MKB-0 is generated.
Next, a media key block MKB-1 is generated. First, verify data (Enc1-KMv) is generated for the temporary media key 1 (T-Km1). Then, a media key Km is supplied through the selector (SEL) 134 to an encryption unit 1222 to generate an encrypted media key Km. Further, the media key Km is multiencrypted by the temporary media key 1 (T-Km1) at an encryption unit 12220 to generate a multiencrypted media key Km. In this case, as in the case of the media key block MKB-0 generation, in the position of the hacked device key, the encrypted media key Km is changed to an encrypted temporary media key 2 (T-Km2) through the selector (SEL) 134. The encrypted temporary media key 2 (T-Km2) is encrypted by a device key, and then multiencrypted by the encrypted temporary media key 1 (T-Km1) to be arranged in the media key block MKB-1. Such a process generates blocks up to media key block MKB-n, whereby media key block MKB are generated for the device key set.
If “n” device keys of Dvk8, . . . Dvkn, . . . Dvk1 are set to constitute the device key set installed in the decryption device of
To begin with, the verify media key Enc1-KMv of the media key block MKB-1 is read, and decrypted by the temporary media key 1 (T-Km1), whereby the key decrypted by the media key block MKB-0 is verified to be a temporary media key 1 (T-Km1).
Next, a verify media key Enc1-Kmn is read from a specified position of the media key block MKB-1 based on position information of a second device key Dvkn of the device key set, decrypted by the temporary media key 1 (T-Km1), and then decrypted by the Dvkn to extract a media key Km. This media key Km is supplied through the selector 131 to the decryption unit 1250 again, and the media key verify data is read there to be decrypted, whereby the media key Km is verified to be correct. However, if the key is not verified to be the correct media key Km at the media key block MKB-1, it is highly likely to be a temporary media key 2 (T-Km2). In a next media key block MKB-2 process, the key is verified to be a temporary media key 2 (T-Km2), and decrypting is executed to extract a media key Km in the same process. If the verification result for the temporary media key 2 (T-Km2) is “NO” in the decryption process, information is determined as improper and the process is ended as an abnormal end. Because of a high possibility of an illegal medium, the playing-back is stopped.
Second Embodiment
Since an encryption/decryption process is carried out in the encoder/decoder board in the multiencryption of the title key, protection of data sent from a drive is entrusted to an authentication process in a PC system to facilitate illegal actions. Thus, the illegal actions are prevented by partially executing encryption/decryption in the drive.
First, an encrypted title key Keet and an encrypted secret key Kes are read. Then, the encrypted secret key Kes is decrypted by a media key Km used for authentication at a decryption unit 509 in a drive to generate a secret key Ks. The encrypted title key Keet is decrypted at a decryption unit 510 to generate an encrypted title key Ket, and this encrypted title key Ket is transferred to a decoder board. Other operations are similar to those of
Accordingly, encrypted media ID (Keid) from a media ID group 501 is decrypted at a decryption unit 4043 to generate media ID (Kid), and this media ID (Kid) is sent to a media ID block (MIDB) generation unit 504. As a result, since the media ID group is the encrypted media ID (Keid) group, a recording signal to the medium is directly distributed individually, and a unique number is recorded in the BCA area of each medium.
Employment of such a method is convenient for medium management in that serial numbers can be used for lower bits of the BCA recorded data of the medium. However, since a signal recorded in the BCA contains position signals in the encrypted media ID (Keid) and the media ID block (MIDB), position data is encrypted by the media key Km to be recorded.
Third Embodiment
The configuration example of the encryption process in the read-only medium has been described with reference to FIGS. 12 to 18. Hereinafter, description will be made of an encryption/decryption system in a rewritable medium with reference to FIGS. 19 to 20. A copyright protection system for the rewritable medium must support each recording which an end user uses. Different from mass-production of media such as ROM, contrary requirement specifications, i.e., a media binding function for each medium, are necessary. Thus, preprocess data for the rewritable medium may provide a support similar to that of the CPRM system of
According to the system of
In step S42, an encrypted encryption key group (media key block MKB) in which a media key Km is encrypted by a device key group, and encrypted encryption key group (media ID block MIDB) in which a media unique key Kum is encrypted by a media ID group are recorded in a lead-in area as embossed prepits.
In step S44, each media ID of the media ID group is encrypted by a media key Km to generate an encrypted media ID (Keid), and recorded as a media unique number in a BCA area for each medium.
An authentication process is similar to that of the aforementioned example, and thus description thereof is omitted. A process of content encryption will be described. Since a device key set 302 provided from the copyright protection (CP) system management organization has been preset, a media key block MKB read from a medium is decrypted by a device key at a media key block (MKB) processing unit 321 to extract a media key Km. Encrypted media ID (Keid) recorded in the BCA area is read, and decrypted by the media key Km at a decryption unit 4042 to generate media ID (Kid). Similarly, a media unique key Kum is extracted from a media ID block MIDB recorded in the lead-in area by using the media ID (Kid) at a media ID block (MIDB) processing unit 505. The media unique key Kum and the media ID (Kid) are mixed at a mixing unit 512 to generate a key for encrypting a content encryption key. A content 100 is encrypted by a title key Kt generated from a random number generator (RNG) 403 at an encryption unit 3054. In this case, the encryption key Kt is further encrypted at an encryption unit 3052 to become an encrypted title key Ket.
By employing such a constitution, an encryption key unique to the recording medium is generated in content encryption in the rewritable medium. Thus, illegal copying in the other media becomes difficult.
In step S52, a drive and an encoder board are authenticated.
In step S54, a media key block MKB is read from the lead-in area, and supplied through an authentication process to an MKB processing unit 321 of the encoder board. The media key block (MKB) is processed there by using a device key set to extract a media key Km.
In step S56, encrypted media ID (Keid) is read from the BCA area, and decrypted by the media key Km at the decryption unit 4042 to extract media ID (Kid).
In step S58, a media ID block MIDB is read from the lead-in area, and sent through an authentication process to the encoder board. The media ID block (MIDB) is processed based on the media ID (Kid) at the MIDB processing unit 505 to extract a media unique key Kum.
In step S60, the media unique key Kum and the media ID (Kid) are mixed to generate a key for encrypting the content encryption key Kt.
In step S62, a content encryption title key Kt is generated at the random number generator 403, and the content 100 is encrypted at the encryption unit 3054 to be recorded in a data recording area.
In step S64, the content encryption title key Kt is encrypted by the key Kuid at the encryption unit 3052 to generate an encrypted content encryption title key Ket. The Key Ket is further encrypted by the secret key Ks to generate an encrypted title key Keet, and this key Keet is recorded.
In step S66, the secret key Ks is encrypted by an encryption key (e.g., Km) used for authentication to generate an encrypted secret key Kes, and this key Kes is recorded in a secret area.
Fourth Embodiment
In the case of playing back the medium in which the recording has been made, a signal recorded in the reproducing drive is read, and correct data is read to a demodulation unit P6 and an ECC error correction processing unit P5. The encrypted title key Keet is made an encrypted title key Ket at a decryption unit P8 in the drive to be sent to an AV decoder board. On the AV decoder board, first, the media ID block MIDB, the media key block MKB, and the encrypted media ID (Keid) are read. At the MIDB & MKB processing unit C2, an encryption key Kuid is generated to be used for decrypting an encrypted content encryption key. By this Kuid, the encrypted title key Ket is decrypted at a TK decryption unit P4 to generate a title key Kt, and sent to a content decryption unit P2 to decrypt the encrypted content. The content decrypted by an AV decoder P1 reproduces the video/audio signal.
Thus, according to the copyright protection system of the embodiment of the present invention, in both of the read-only medium and the rewritable medium, encryption/decryption is basically carried out by using a code unique to each medium. Illegal copying between disks is prevented, and the media can be individually managed together with the recording/reproducing device. Thus, illegal copying can be prevented by the entire system. Especially, the write-once type recordable medium for authoring must be verified as a ROM medium, and media identification that simply comes from media unique physical properties cannot be incorporated in an infringement prevention system. However, according to the embodiments of the present invention, since a unique identification code is added even to the read-only medium to manage the same, it is possible to configure a copyright protection system which can prevent illegal copying irrespective of media types.
As described above, the embodiments of the present invention have the following aspects.
(1) The method for recording a content comprises:
By using the two encrypted encryption key groups generated by encrypting the encryption key by a plurality of keys, the encryption key management system for connecting the groups is configured to enable presence of plural kinds of encryption keys in two positions (device key and media key). Thus, it is possible to configure an integrated encryption management system while individually adding the unique device key of the recording/reproducing device and the media identification code of the media.
(2) The method for recording a content comprises:
Since the encrypted media identification code (Keid) is generated by encrypting the media identification code (Kid) 501 and position information in a group of the media identification codes by the first key (Km) for each medium, it is possible to improve security performance of the media unique key (Kum) used for encrypting the content.
(3) The method for recording a content comprises:
The plurality of first generated media identification codes are assumed to be information encrypted by the media key Km, and meaning of the media identification codes is reverse to that of (1) so that the media identification codes can be decrypted by the media key (Km) to be used as an encryption key during the generation of the second encrypted encryption key group (MIDB). Thus, it is possible to use a serial number as the recording media identification code of the medium.
(4) In the content recording method, a plurality of second keys (Kd) are unique device keys which are distributed to recording/reproducing devices as a key set in which a plurality of keys are set.
The number of device keys individually distributed to recording/reproducing devices becomes large. However, by using the encrypted encryption key group generated by encrypting the specific encryption key by a large number of second encryption keys, a common media key is generated even if the unique encryption keys are distributed to the recording/reproducing devices.
(5) In the method according to one of (1) to (4), the encrypted media identification codes (Keid) are recorded in a specific area of the medium in a postprocess after the encrypted content, the content encryption key, and the first and second encrypted encryption key groups are recorded.
Individual media management is enabled even for a ROM medium by recording the encrypted media identification codes in the BCA area or the like of the DVD.
(6) In the content recording method, the encrypted media identification code (Keid) includes a combination of a random number and a serial number.
Random characteristics are necessary because the media identification code is used for generating and extracting the encryption key to encrypt the content. However, the media identification code may be used as a media management number, and both uses are simultaneously possible by synthesizing the random number and the serial number.
(7) The method for recording a content comprises:
It is possible to add an identification code unique to each medium while the configuration is similar to that of the CPPM/CPRM copyright protection system used for the DVD.
(8) The method for recording a content comprises:
The title key is subjected to a multiencryption process, whereby one of the encryptions is executed only in the recording/reproducing drive for the recording medium. Thus, since a content cannot be restored even if the encryption key and the encrypted content are all copied by an illegal drive, revocation of the illegal drive is facilitated.
(9) In the content recording method described above, the medium is a read-only medium.
The method provides a great advantage that the media unique number can be used even in the read-only medium which has conventionally been impossible.
(10) In the recording medium:
The media identification codes are encrypted by the media key. Thus, even if the second encrypted encryption key group block (MIDB) for extracting the media unique key (Kum) which is an encryption key of the title key to encrypt the content is read, security performance is kept, and a content media binding function is strengthened.
(11) In the recording medium:
It is assumed that the media identification code includes a first constructed one of the encrypted codes and a method for decrypting an encryption key by a media key is employed when the second encrypted encryption key group block is constructed. Thus, a serial number or the like can be used for the encrypted media identification code for the medium, and medium manufacturing management is facilitated.
(12) The device for recording a content comprises:
(13) The device for recording a content comprises:
(14) The device for recording an encrypted content in a recording medium wherein:
The recording device is constituted in such a manner that the content is encrypted to be recorded in a medium in which the first and second encrypted encryption key groups (MKB) and (MIDB) and the encrypted media identification codes (Keid) have been recorded. Even in the read-only media a great number of which are sold, by introducing the second encrypted encryption key group (MIDB), it is possible to issue identification codes of media carriers more freely than the “media ID” which is a media unique number used in the copyright protection system of the conventional DVD recording/reproducing device.
(15) The device for recording an encrypted content in a recording medium wherein:
The title key is mulitencrypted by the media unique key (Kum) and the secret key (Ks). Thus, in the recording/reproducing system, if the content encryption unit and the recording medium recording unit (drive) are separated through an interface, it is possible to improve the efficiency of preventing copying of all the encrypted data by executing encryption during recording and combining during reproducing in these units.
While the description above refers to particular embodiments of the present invention, it will be understood that many modifications may be made without departing from the spirit thereof. The accompanying claims are intended to cover such modifications as would fall within the true scope and spirit of the present invention. The presently disclosed embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims, rather than the foregoing description, and all changes that come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. For example, the present invention can be practiced as a computer readable recording medium in which a program for allowing the computer to function as predetermined means, allowing the computer to realize a predetermined function, or allowing the computer to conduct predetermined means.
Number | Date | Country | Kind |
---|---|---|---|
2003-199349 | Jul 2003 | JP | national |