Embodiments of the present invention will be described below with reference to the accompanying drawings.
A data inspection apparatus 10 according to the present embodiment is used for inspecting data stored on an optical disk D, and is constructed in such a manner that an optical disk reading section 28, an input content data reading section 29, a CPU (Central Processing Unit) 4, a ROM (Read Only Memory) 14, a RAM (Random Access Memory) 8, an inspection data DB (Database) 20, an input control section 9, and an output control section 22 are connected to one another via an internal bus.
The optical disk reading section 28 is made of, for example, an optical pickup, and is used for reading inspection data which is an inspection target stored on the optical disk D.
The input content data reading section 29 is used for reading original input content data 27 which has been created in, for example, a studio outside the data inspection apparatus 10. The read input content data 27 becomes reference data for inspection.
The input control section 9 is connected to an input device such as a keyboard via, for example, a USB (Universal Serial Bus) cable.
As shown in
The special reading program 151 is used for reading data of the highest level of secrecy stored on the optical disk D, by means of the optical disk reading section 28. The data of the highest level of secrecy is stored by using the wobble of a row of pits formed on the optical disk D in advance, so as not to be read with an ATAPI command or the like which is a general read command.
The decryption program 152 is used for decrypting according to the level of secrecy the data read by the optical disk reading section 28 and acquiring inspection data.
The comparison result generation program 153 is used for generating comparison result data by comparing the reference data read by the input content data reading section 29 with the inspection data decrypted by the decryption program 152. At this time, the comparison of the data is performed on a one to one basis for each of files which constitute the respective data. The comparison result data contains, for example, data indicating whether the compared inspection data are the same as well as data indicating which of the inspection data differs.
The encryption program 154 is used for encrypting the reference data, the decrypted inspection data and the comparison result data according to the level of secrecy. The algorithm of each of the encryption program 154 and the decryption program 152 uses, for example, DES (Data Encryption Standard) or AES (Advanced Encryption Standard).
The authority decision program 155 is used for determining the authority level of a user, such as a manager of a manufacturer or a manager of a manufacturing plant, who is to access the data inspection apparatus 10, on the basis of authority level data with which the user is to access from the input device, such as a keyboard, outside the data inspection apparatus 10. Data that is allowed to be acquired by each user, for example, a manager of a manufacturer and a manager of a manufacturing plant, is restricted by this program.
The CPU 4 controls the entire data inspection apparatus 10 by using a control program 156 stored in the ROM 14. At this time, the RAM 8 is used as a work area.
The inspection data DB 20 is made of, for example, flash ROMs 5, 6 and 7. In addition, the inspection data DB 20 is not limited to the flash ROMs, and may also use, for example, an EPROM (Erasable Programmable Read Only Memory) or a hard disk which is of an erasable and writable type. The flash ROMs 5, 6 and 7 are used for storing individual data encrypted by the encryption program 154 according to their respective levels of secrecy. In order to protect and store data of the highest level of secrecy (of protection level 3), the flash ROM 7, for example, is constructed to be able to prevent data from being leaked out, unlike a general hard disk drive. For example, data encrypted by AES is stored in the flash ROM 7 by using a wobble signal of the optical disk D. Furthermore, the CPU 4 is set to automatically issue a command to erase the data in the flash ROM 7, for example, when the power of the data inspection apparatus 10 is turned off. This mechanism for preventing leak of data is not limitative, and the flash ROM 7 may also be set not to allow copying with a general copy command to copy data from the flash ROM 7.
As shown in
The input content data 27 is stored on the optical disk D according to the data writing flowchart shown in
Inspection result data and processing error data and the like to be handled by users are set to protection level 1 because their levels of secrecy are comparatively low. The content 1, the content key 11 and the like are set to protection level 2 because they are higher in level of secrecy than the data of protection level 1. The disk master key 21 is set to protection level 3 because it is important data of the highest level of secrecy which is the cause of leak of all data such as the content 1.
The output control section 22 is connected via an external bus to an output device, such as a monitor, which is not shown. The output control section 22 is used for controlling signals to the monitor and the like.
The operation of the data inspection apparatus 10 will be described below with reference to
When the optical disk D is set in the optical disk reading section 28 and, for example, an inspection start button which is not shown is depressed, the processing shown in
In step 301, the CPU 4 reads through the optical disk reading section 28 the encrypted content 1A, the encryption key locker 10B, the disk master key 21 and the like which are stored on the optical disk D, and stores the read data in the RAM 8, for example. At this time, the CPU 4 reads the disk master key 21 stored by using a wobble on the optical disk D, by means of the special reading program 151.
In step 302, the CPU 4 reads the input content data 27 created in a studio or the like through the input content data reading section 29, and stores the read data in the RAM 8, for example.
In step 303, the CPU 4 decrypts the content 1A, the encryption key locker 10B and the like which have been read by the optical disk reading section 28, according to their respective levels of secrecy in accidence with the flowchart shown in
Namely, as shown in
In step 304, in order to detect errors in the content 1, the CPU 4 compares the input content data 27 with the decrypted content 1, the content key 11, the disk master key 21 and the like and generates inspection result data 51 by using the comparison result generation program 153, and stores the inspection result data 51 in the RAM 8.
In step 305, the CPU 4 performs encryption processings 501, 502 and 503 for encrypting the input content data 27, the decrypted content 1, the content key 11, the disk master key 21 and the like as well as the inspection result data 51 by using the encryption program 154 at protection levels 1, 2 and 3 corresponding to their respective levels of secrecy.
As shown in
In step 306, the data of protection levels 1, 2 and 3 that have been encrypted in step 305 are respectively stored into the flash ROMs 5, 6 and 7 which are respectively storages with protection levels 1, 2 and 3. At this time, the CPU 4 issues a special write request for storing data by using a wobble on the optical disk D, and stores the data of protection level 3.
As shown in
In step 802, the CPU 4 performs protection level 1, 2 and 3 data decryption and extraction processings 505, 506 and 507 shown in
In step 803, the CPU 4 performs data output processing to process the data decrypted in step 802 into an arbitrary format and output the processed data to the output device such as a monitor to cause it to display the data.
In the present embodiment, the inspection data 30 can be inspected by comparing the reference data and the decrypted inspection data 30 (ST304), and after the inspection, for example, individual data are encrypted according to their respective levels of secrecy (ST306) and are stored in the flash ROMs 5, 6 and 7 (ST306), so that data of high level of secrecy can be prevented from being leaked out and data can be efficiently protected and stored. In addition, there is a case where when the protection level increases, the processing speed required for encryption increases, causing an increase in cost, but since the inspection data 30 is encrypted and stored according to its level of secrecy (ST305), cost reduction can be promoted compared to the case where all data are set to protection level 3.
In the present embodiment, the CPU 4 uses the decryption program 152 to decrypt the encryption key locker 10B by means of the disk master key 21 and decrypt the content 1A and the like by means of the content key 11 and the like. For this reason, even if the encryption key locker 10B is leaked out, the content 1A and the like cannot be decrypted, and in addition, the disk master key 21 is needed. Accordingly, data can be prevented from being easily leaked out.
In the present embodiment, the authority level is determined on the basis of the authority level data 53 that has been inputted from an input device or the like outside the data inspection apparatus 10, and data to be decrypted is determined from among the decrypted reference data, the decrypted inspection data and the decrypted inspection result data 51 (ST802). Accordingly, the data can be securely provided according to the authority level data 53 that has been inputted from the outside, and can be securely protected.
In the present embodiment, the disk master key 21 for protection level 3 which is of the highest level of secrecy is stored on the optical disk D by using the wobble of a row of pits on the optical disk D. Accordingly, the disk master key 21 cannot be read with a general optical pickup.
In the present embodiment, inspection data that has temporarily been encrypted for inspection is decrypted and stored in the flash ROMS 5, 6 and 7. Accordingly, data can be securely managed.
In the present embodiment, a data inspection apparatus 40 includes the flash ROM 7 accommodated in an opening-proof container 37. The opening-proof container 37 has a lid, and a sensor 41 for monitoring and detecting the state of closure of this lid is provided in the opening-proof container 37. The sensor 41 is connected to the CPU 4 via the internal bus, and the CPU 4 is constructed so that, for example, when the lid is opened, the CPU 4 receives a signal from the sensor 41 and issues a command to erase the data stored in the flash ROMs 5, 6 and 7.
In the present embodiment, the CPU 4 can erase the data stored in the flash ROMs 5, 6 and 7, for example, when the lid of the opening-proof container 37 is opened. Accordingly, the data can be far more securely prevented from being leaked out of the data inspection apparatus 40.
The present invention is not limited to either of the above-mentioned embodiments, and can be modified in various ways.
In the above description of the embodiments, reference has been made to the example in which the disk master key 21 is stored so as not to be read with a general optical pickup, by using the wobble of a row of pits or the like on the optical disk D. However, this example is not limitative, and the construction may be modified so that a command program using complex software, for example, is needed for the reading of data from the optical disk D. This construction can similarly prevent leak of data from the optical disk D.
In the above description of the embodiments, reference has been made to the example in which the encryption key locker 10B and the disk master key 21 are used to engage a double lock. However, the number of keys may be increased so that data can be far more securely protected.
In the above description of the embodiments, reference has been made to the example in which the input content data 27 that has been read by the input content data reading section 29 is data that is decrypted in advance. However, the construction may be modified so that encrypted data is read by the input content data reading section and is similarly decrypted into reference data.
In the above description of the embodiments, reference has been made to the example in which the inspection data and the like are read in step 301, the reference data is read in step 302, and the inspection data is decrypted in step 303. However, the order of steps 301 and 302 may be reversed, or these processings may be joined so that, for example, the disk master key 21 and the encryption key locker 10B are decrypted immediately after having been read, and subsequently, the encrypted content 1A and the like are read. In this manner as well, the encrypted content 1A and the like can be similarly decrypted.
In the above description of the embodiments, reference has been made to the example in which each data decrypted in step 303 and the reference data are compared to generate an inspection result. However, the construction may be modified so that the input content data 27 encrypted in step 301 is read and the encrypted data and the unencrypted data read by the optical disk reading section 28 in step 301 are compared to generate a comparison result, and the comparison result is stored as comparison result data. Far more accurate inspection can be performed with the comparison result data.
In the above description of the embodiments, reference has been made to the example in which, for example, a stream file is encrypted from among the files contained in the content 1 and the like. However, in order to increase the security of encryption, it is preferable to encrypt, for example, all files contained in the content 1 and the like.
In the above description of the second embodiment, reference has been made to the example in which the flash ROM 7 is accommodated in the opening-proof container 37. However, the flash ROMs 5, 6 and 7 may also be accommodated in the opening-proof container.
In the above description of the second embodiment, reference has been made to the example in which, for example, when the lid of the opening-proof container 37 is opened, the CPU 4 erases the data stored in the flash ROMs 5, 6 and 7. However, this construction is not limitative, and a similar effect can be obtained in such a manner that, for example, when the power of the data inspection apparatus 40 is turned off, the data stored in the flash ROMs 5, 6 and 7 are erased or changed by using current stored in a capacitor or the like which is not shown.
As described above, according to the present invention, it is possible to inspect content data, and since decrypted content data and comparison result data are encrypted and stored according to their respective levels of secrecy after inspection, it is possible to prevent data of high level of secrecy from being leaked out during the inspection.
Number | Date | Country | Kind |
---|---|---|---|
2004- 159986 | May 2004 | JP | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/JP05/09289 | 5/16/2005 | WO | 00 | 11/14/2007 |