Method for managing copy protection information of recording medium

Abstract
A method for managing copy protection information of a recording medium is disclosed. Copy protection information for decrypting A/V data encrypted and recorded in a data area of an optical disc such as a CD, a DVD or a BD is recorded in a key locker in the optical disc. A first key value for reading the copy protection information is recorded in a specific area of the optical disc, and a second key value for reading the copy protection information is managed in an optical disc drive or in an application. To reproduce the A/V data in the optical disc, the copy protection information recorded in the key locker is read and decrypted by a combination of a hidden code (having the first key value) recorded in the optical disc and a drive or application key (having the second key value) managed in the optical disc drive or application. This significantly improves the security of the copy protection information.
Description


BACKGROUND OF THE INVENTION

[0001] 1. Field of the Invention


[0002] The present invention relates to a method for managing copy protection information of a recording medium, and more particularly to a method for improving the security of copy protection information for decrypting A/V data encrypted and recorded in a data area of an optical disc such as a CD (Compact Disc), a DVD (Digital Versatile Disc) or a BD (Blue-ray Disc).


[0003] 2. Description of the Related Art


[0004] Generally, an optical disc, for example a CD or a DVD, capable of recording digital video or audio data has been widely used and commercialized, and as the standardization of a high-density optical disc such as a BD has progressed rapidly, related products are expected to be commercialized in the near future.


[0005] To prevent illegal and unauthorized duplication of contents of digital video or audio data recorded in such an optical disc, a copy protection information management method has been proposed in which A/V data encrypted using copy protection information is recorded in a data area of an optical disc and the copy protection information is recorded and managed in a specific area, such as a lead-in area, of the optical disc. This method is described in detail as follows.


[0006]
FIG. 1 is a block diagram showing the configuration of an optical disc drive 200 and an application 300 to which a general method for managing copy protection information of DVDs is applied. As shown in FIG. 1, the optical disc drive 200 may include an authentication block 20, a key sharing block 21, and encryption blocks 22 and 23.


[0007] The application 300 such as a personal computer (PC) may include an authentication block 30, a key sharing block 31, decryption blocks 32 and 33, a descrambler block 34, a decompression block 38, a description disc key 36, and a description title key 37.


[0008] An authentication control key, a secured disc key, an encrypted title key, and scrambled A/V data may be stored in a DVD 100 to be inserted into the optical disc drive 200.


[0009] The authentication block 20 of the optical disc drive 200 uses an authentication control key read from the DVD 100 to perform a series of authentication processes for transmission and reception of data to and from the authentication block 30 of the application 300. Using a predetermined encryption key provided-from the key sharing block 21, the encryption blocks 22 and 23 re-encrypt a secured disc key and an encrypted title key read from the DVD 100 into data suitable for transmission and reception, and then transmit the re-encrypted data.


[0010] Using a predetermined description key provided from the key sharing block 31, the decryption blocks 32 and 33 of the application 300 perform a series of operations to decrypt a secured disc key and an encrypted title key received from the optical disc drive 200.


[0011] The disc key is decrypted using a master key 35 managed in the application 300, and the title key is decrypted using the decrypted disc key. The descrambler block 34 uses the title key to descramble scrambled A/V data read from the DVD 100. The decompression block 38 decompresses the descrambled A/V data to output original A/V data. Such processes make it possible to prevent unauthorized and illegal duplication of contents of audio or video data scrambled and recorded in the DVD 100.


[0012] However, the copy protection information such as the secured disc key and the encrypted title key recorded in the DVD may be illegally hacked and distributed by a third party such as a hacker, allowing illegal duplication of the A/V data encrypted and recorded in the data area of the DVD. It is thus urgently needed to provide an effective solution that can sufficiently reinforce the security of the copy protection information.



SUMMARY OF THE INVENTION

[0013] Therefore, the present invention has been made in view of the above problems, and it is an object of the present invention to provide a method and apparatus for managing copy protection information of a recording medium, which sufficiently reinforces the security of copy protection information.


[0014] It is another object of the present invention to provide a method and apparatus for managing copy protection information of a recording medium, which reduces the risk of exposure of copy protection information.


[0015] It is another object of the present invention to provide a copy protection method and apparatus that is highly secure and reliable.


[0016] It is yet another object of the present invention to provide a method and apparatus for managing copy protection information of a recording medium, which prevents illegal duplication of contents by preventing digital plain data decoded by the copy protection information from being exposed.


[0017] In accordance with the present invention, the above and other objects can be accomplished by the provision of a method for managing copy protection information of a recording medium, the method comprising: recording copy protection information in a first specific area of a recording medium, said copy protection information being used for decrypting data encrypted and recorded in a data area of the recording medium; and recording a first key in a second specific area of the recording medium, said first key being used for decrypting the copy protection information, wherein a second key for decrypting the copy protection information is managed in a drive or an application for playing recording mediums.


[0018] In accordance with another aspect of the present invention, there is provided a recording medium, comprising: a data area in which data encrypted using copy protection information is recorded; a first specific area in which the copy protection information is recorded; and a second specific area in which a first key for decrypting the copy protection information is recorded.


[0019] In accordance with another aspect of the present invention, there is provided a method for managing copy protection information of a recording medium, the method comprising the steps of: a) decrypting copy protection information, recorded in a first specific area of a recording medium, using a first key and a second key, said first key being read from a second specific area of the recording medium, said second key being managed in a drive or an application for playing the recording medium; and b) decrypting data, encrypted and recorded in a data area of the recording medium, using the decrypted copy protection information.


[0020] In accordance with a further aspect of the present invention, there is provided an apparatus for managing copy protection information of a recording medium, the apparatus comprising: a second key generator for generating a second key required to decrypt copy protection information read from a first specific area of a recording medium; and a copy protection information calculator for decrypting the copy protection information using the second key and a first key read from a second specific area of the recording medium.







BRIEF DESCRIPTION OF THE DRAWINGS

[0021] The above and other objects, features and other advantages of the present invention will be more clearly understood from the following detailed description taken in conjunction with the accompanying drawings, in which:


[0022]
FIG. 1 is a block diagram showing the configuration of an optical disc drive and an application to which a general method for managing copy protection information of a DVD is applied;


[0023]
FIGS. 2 and 3 are block diagrams showing the configuration of an optical disc drive to which a method for managing copy protection information of a recording medium according to one embodiment of the present invention is applied;


[0024]
FIGS. 4 and 5 are block diagrams showing the configuration of an optical disc drive and an application to which a method for managing copy protection information of a recording medium according to another embodiment of the present invention is applied.







DETAILED DESCRIPTION OF PREFFERRED EMBODIMENTS

[0025] Preferred embodiments of a method for managing copy protection information of a recording medium according to the present invention will now be described in detail with reference to the accompanying drawings.


[0026]
FIG. 2 is a block diagram showing the configuration of an optical disc drive 500 to which the method for managing the copy protection information of the recording medium according to the present invention is applied. As shown in this figure, the optical disc drive 500 may include a decryption block 50 and a key calculation block 51. A drive key 52 newly defined according to the present invention may be managed in the optical disc drive 500.


[0027] Copy protection information, for example an encrypted disc key, is recorded in a key locker provided in an optical disc 400 to be inserted into the optical disc drive 500. In addition, a hidden code having a first key value for reading the disc key is recorded in a pre-recorded form in a specific area of the optical disc 400, for example in a pre-recorded (embossed) area of a lead-in area of the optical disc 400.


[0028] The disc key recorded in the key locker is read and decrypted using a valid key value that is calculated by a combination of the hidden code having the first key value and the drive key having a second key value, which is managed in the optical disc drive 500. This improves the security of the copy protection information.


[0029] As shown in FIG. 3, the key calculation block 51 of the optical disc drive 500 may include a calculation unit (not referenced) for calculating a valid key that allows the key locker to be unlocked by a combination of the hidden code and the drive key, and a decryption unit (not referenced) for decrypting the disc key encrypted and recorded in the key locker using the calculated valid key.


[0030] The drive key can be managed with a different key value depending on optical disc drives. For example, the drive key can be managed with a unique key value identified by a drive ID (Drive_ID) of a maker that has manufactured the optical disc drive.


[0031] As shown in FIG. 4, the optical disc drive 500 can be used in connection with an application 600 (for example, a personal computer) to and from which the optical disc drive 500 transmits and receives data through a secure authenticated channel (SAC) 70. The application 600 includes an A/V decoder 60 for decoding A/V data received through the secure authenticated channel 70.


[0032] The application 600 may manage an application key 61 therein, and the optical disc drive 500 may include an application key module 53 therein. In this case, the application key module 53 receives the application key 61 managed in the application 600 through the secure authenticated channel 70, and then provides the received application key 61 to the key calculation block 51.


[0033] The key calculation block 51 in the optical disc drive 500 reads and decrypts the disc key in the key locker recorded in the optical disc by a combination of the hidden code having the first key value and the drive or application key having the second key value, which is managed in the optical disc drive 500 or in the application 600.


[0034] The decryption block 50 performs a series of operations for decrypting audio and video data, encrypted and recorded in the data area of the optical disc, using the disc key. The decryption block 50 then outputs the decrypted audio and video data to the application 600 through the secure authenticated channel 70.


[0035] The A/V decoder 60 included in the application 600 decodes the audio and video data, received from the optical disc drive 500 in such a manner, to recover audio and video signals. In such a manner, the audio and video data recorded in the optical disc is normally reproduced.


[0036] As shown in FIG. 5, an A/V decoder 57 may also be provided not in the application 600 but in the optical disc drive 500. In this case, since the optical disc drive 500 outputs completely decoded audio and video data to the application 600 through the secure authenticated channel 70, the optical disc drive 500 can reduce the risk of hacking of the copy protection information, compared to when bit streams of the audio and video data are transmitted directly to the application 600 as shown in FIG. 4.


[0037] In the case of FIG. 5, the optical disc drive 500 does not include the application key module 53 therein but manages a drive key 52 therein as shown in FIG. 5.


[0038] For reference, the hidden code is recorded on the optical disc in the form of wobble pre-pits (as a wobble pre-pit type) or in the form of a physical wobble having a low frequency component, so that it cannot be illegally duplicated using a bit to bit copy. The drive key, the disc key included in the key locker, or the like can also be recorded in the lead-in area of the optical disc in the form of wobble pre-pits (as a wobble pre-pit type) or in the form of a physical wobble having a low frequency component, as with the hidden code. Various additional information, in addition to the copy protection information such as the disk key, may be encrypted and recorded in the key locker, which is encrypted by the hidden code and the drive key.


[0039] As apparent from the above description, the present invention can significantly improve the security of copy protection information.


[0040] The present invention can also reduce the risk of exposure of the copy protection information.


[0041] In addition, the present invention prevents decoded digital data from being exposed.


[0042] Although the preferred embodiments of the present invention have been disclosed for illustrative purposes, those skilled in the art will appreciate that various modifications, additions and substitutions are possible, without departing from the scope and spirit of the invention as disclosed in the accompanying claims.


Claims
  • 1. A method for managing copy protection information of a recording medium, the method comprising: recording copy protection information in a first specific area of a recording medium, said copy protection information being used for decrypting data encrypted and recorded in a data area of the recording medium; and recording a first key in a second specific area of the recording medium, said first key being used for decrypting the copy protection information, wherein a second key for decrypting the copy protection information is managed in a drive or an application for playing recording mediums.
  • 2. The method according to claim 1, wherein the copy protection information is decrypted by a combination of the first key and the second key.
  • 3. The method according to claim 1, wherein the second key is a unique key identified by a unique drive ID of a maker that has manufactured the drive.
  • 4. The method according to claim 1, wherein the copy protection information is a recording medium key recorded after being encrypted.
  • 5. The method according to claim 1, wherein the first key is a hidden code recorded in the form of a wobble having a low frequency component that is not duplicated using a bit to bit copy.
  • 6. A recording medium, comprising: a data area in which data encrypted using copy protection information is recorded; a first specific area in which the copy protection information is recorded; and a second specific area in which a first key for decrypting the copy protection information is recorded.
  • 7. The medium according to claim 6, wherein the copy protection information is a recording medium key for decrypting the data encrypted and recorded in the data area of the recording medium, said copy protection information being recorded after being encrypted.
  • 8. The medium according to claim 6, wherein the first key is a hidden code recorded in the form of a wobble having a low frequency component that is not duplicated using a bit to bit copy.
  • 9. The medium according to claim 6, wherein the copy protection information is decrypted by a combination of the first key and a second key, said second key being managed in a drive or an application for playing the recording medium.
  • 10. A method for managing copy protection information of a recording medium, the method comprising the steps of: a) decrypting copy protection information, recorded in a first specific area of a recording medium, using a first key and a second key, said first key being read from a second specific area of the recording medium, said second key being managed in a drive or an application for playing the recording medium; and b) decrypting data, encrypted and recorded in a data area of the recording medium, using the decrypted copy protection information.
  • 11. The method according to claim 10, wherein the first key is a hidden code recorded in the form of a wobble having a low frequency component that is not duplicated using a bit to bit copy.
  • 12. The method according to claim 10, wherein the second key is a unique key identified by a unique drive ID of a maker that has manufactured the drive.
  • 13. The method according to claim 10, wherein the copy protection information is a disc key encrypted and recorded in a key locker of the recording medium.
  • 14. The method according to claim 10, further comprising the step of decoding and outputting the decrypted data.
  • 15. An apparatus for managing copy protection information of a recording medium, the apparatus comprising: a second key generator for generating a second key required to decrypt copy protection information read from a first specific area of a recording medium; and a copy protection information calculator for decrypting the copy protection information using the second key and a first key read from a second specific area of the recording medium.
  • 16. The apparatus according to claim 15, wherein the copy protection information calculator includes: a valid key generator for producing a valid key using the first and second keys, said valid key being required to decrypt the copy protection information; and a copy protection information decryption unit for decrypting the copy protection information using the valid key.
  • 17. The apparatus according to claim 15, wherein the second key is a unique key identified by a unique drive ID of a maker that has manufactured a drive for playing recording mediums, said drive including the apparatus.
  • 18. The apparatus according to claim 15, wherein the second key is an application key managed in an application connected to the apparatus through a secure authenticated channel.
  • 19. The apparatus according to claim 15, further comprising a data decryption unit for decrypting data, read from a data area of the recording medium, using the decrypted copy protection information.
  • 20. The apparatus according to claim 19, further comprising a decoder for decoding the decrypted data, and outputting the decoded data to the application through the secure authenticated channel.
  • 21. The apparatus according to claim 20, wherein the second key is a unique key identified by a unique drive ID of a maker that has manufactured a drive for playing recording mediums, said drive including the apparatus.
Priority Claims (1)
Number Date Country Kind
10-2003-0026148 Apr 2003 KR