The present application claims priority from Japanese patent application serial no. JP 2008-170612, filed on Jun. 30, 2008, the content of which is hereby incorporated by reference into this application.
1. Field of the Invention
The present invention relates to an encryption key of an apparatus for recording or reproducing encrypted information for copyright protection, and particularly to a method of easily managing key information unique to a drive unit of the apparatus.
2. Description of the Related Art
In a recording/reproducing apparatus with a digital recording method using optical media such as a DVD (Digital Versatile Disc) and a BD (Blu-ray Disc), there is a need of taking measures for copyright protection due to high quality of reproduced images and less deterioration of quality of replication. In order not to reproduce content necessitated copyright protection other than a specified reproducing apparatus and a specified user, encryption recording is performed.
In order to encrypt and record information or to reproduce the information, it is necessary for a drive apparatus to store unique key information for encryption or decryption thereof.
Japanese Patent Application Laid-Open No. 2005-039480 discloses a recording apparatus which encrypts and records content necessitated copyright protection using a plurality of encryption keys.
A part of the encryption keys is stored into a non-volatile memory inside an apparatus at the time of manufacturing the apparatus. If the encryption keys are not correctly stored due to some error, or if forgot to store, an operation of correct encryption or decryption can not be naturally performed. However, since the encryption and decryption are performed by combining a plurality of techniques as described in Japanese Patent Application Laid-Open No. 2005-039480, various causes are conceivable in the problem of the operation. Therefore, in order to specify the cause, many processes are required.
An object of the present invention is to solve the above-described problem and to provide a method of, when a problem occurs at the time of performing an encryption operation or decryption operation due to a trouble in storing an encryption key, easily specifying its cause.
In order to achieve the above-described object, the present invention provides a method of confirming a drive unique key which is one of encryption keys used in a drive apparatus that records information including video and audio encrypted by using an encryption application into an optical disc recording medium, or a drive apparatus that reproduces the encrypted and recorded information from the optical disc recording medium for decryption, the method including: a storing step of storing the drive unique key into a storage unit of the drive apparatus; a flag generating step of generating a flag indicating whether or not the drive unique key is stored into the drive apparatus; a command generating step of generating a command checking the presence or absence of the drive unique key in the storage unit of the drive apparatus; and an outputting step of outputting the flag stored into the storage unit in response to the command.
Further, the present invention provides a method of confirming a drive unique key which is one of encryption keys used in a drive apparatus that records information including video and audio encrypted by using an encryption application into an optical disc recording medium, or a drive apparatus that reproduces the encrypted and recorded information from the optical disc recording medium for decryption, the method including: a command generating step of generating a command checking the presence or absence of the drive unique key; a checking step of checking the presence or absence of the drive unique key in the drive apparatus in response to the command; a flag generating step of generating a flag indicating the presence or absence of the drive unique key in response to the checking result of the checking step; and an outputting step of outputting the flag generated in the flag generating step.
Further, the present invention provides an optical disc recording/reproducing apparatus having a drive which records information including video and audio encrypted by using an encryption application into an optical disc recording medium and reproduces the encrypted and recorded information for decryption, the apparatus including: a recording unit which records the information including the input video and audio as encoded recording content; a reproducing unit which reproduces the encrypted recording content from the optical disc recording medium, and decrypts the encryption to be output; a storage unit which stores a drive unique key that is used for the encryption and its decryption and is unique to the drive; a controlling unit which generates a flag indicating the presence or absence of the drive unique key in the storage unit; an inputting unit which inputs a command checking the presence or absence of the drive unique key in the storage unit; and an outputting unit which outputs the flag generated by the controlling unit in response to the command.
According to the present invention, the presence or absence of encryption key information in a recording apparatus, a reproducing apparatus, or a recording/reproducing apparatus can be easily confirmed, so that the cause of a problem in encryption, decryption, or system authentication can be easily specified, thus contributing to improvement of usability for a user or a service person of the apparatus.
These and other features, objects and advantages of the present invention will become more apparent from the following description when taken in conjunction with the accompanying drawings wherein:
Hereinafter, an embodiment of the present invention will be described with reference to the drawings.
First, a recoding operation will be described. Data of a video signal (V) of content to be recorded are input from an input terminal 100a, and data of an audio signal (A) thereof are input from an input terminal 100b. The input data is compressed by an AV encoding circuit 101 using MPEG2 (Moving Picture Experts Group 2), AC-3 (Audio Code Number 3) and the like. The data are time-division multiplexed, and then are encrypted by a content encryption unit 102 using an encryption key. Then, an error correction code used for correcting an error of data in a recording/reproducing process is added to the encrypted data by an ECC (Error Correction Code) circuit 103. Thereafter, the resultant data are converted into a code suitable for recording by an MOD (Modulator) circuit 104 using, for example, an 8-16 modulation scheme, and the code is power-amplified by an REC (Record) circuit 105 to be recoded into a content recording area of an optical disc 300. In addition, information of an encryption key which will be described later is also input to the ECC circuit 103, and is recorded into the content recording area.
Next, an operation of the content encryption unit 102 and the information of the encryption key input to the ECC circuit 103 will be described.
In the content encryption unit 102, content information output from the AV encoding circuit 101 is encrypted by, for example, scramble arithmetic processing using a title key Kt generated by a title key generating unit 106. As one example of a method of generating the title key by the title key generating unit 106, a random number is generated when being instructed to record a title including the video data and the audio data, and the random number is used as a title key.
In order to decrypt the encryption when reproducing information, which will be described later, it is necessary to record the title key Kt used for encryption into a recording medium. The title key Kt is encrypted by a title key encryption unit 107 so as not to be easily recognized, and then is recorded into the content recording area of the optical disc 300 through the ECC circuit 103 and the like. One example thereof will be described next.
A title encryption key Kuid is supplied to the title key encryption unit 107. The title encryption key Kuid is generated on the basis of MKB (Media Key Block), MIDB (Media Identification Block), and encryption media ID (Identification) Keid which are recoded into areas other than the content recording area of the disc and read. MKB is generated by performing arithmetic processing for a media key Km issued by its copyright owner on the basis of a device key Kd. MIDB is generated by performing arithmetic processing for a media unique key Kum given by its copyright owner on the basis of a plurality of media IDs (not shown). Keid is generated by encrypting the media IDs using the media key Km. Keid is operated together with MKB and MIDB by an MKB/MIDB processing unit 301 to generate the title encryption key Kuid.
The title key Kt is encrypted by the title key encryption unit 107 using the title encryption key Kuid. Therefore, a title key Ket after encryption is generated after combined encryption processes are carried out using the key given by the copyright owner and the device key, and it is impossible to easily recognize the original title key Kt.
Referring back to
The encrypted title key Ket is also output from the ECC circuit 203, and is supplied to a title key decryption unit 207. The title encryption key Kuid is obtained by the MKB/MIDB processing circuit 301 by performing arithmetic processing using MKB, MIDB, and Keid reproduced from the encryption information recording area 300c of the optical disc. Therefore, the encryption of the title key is decrypted by the title key decryption unit 207 to obtain the original title key Kt. Accordingly, decryption can be performed by the content-encryption decryption unit 204.
Many of the signal processing in
The above-described drive unique key is one of the device keys Kd given to a drive apparatus at the time of manufacturing. A drive unique key in accordance with, for example, AACS (Advanced Access Content System), VCPS (Video Content Protection System) or the like is already used. The drive unique key is necessary for the operation of encryption and decryption and system authentication.
Next, there will be described a method of confirming whether or not the drive unique key is correctly stored. In the case where the drive unique key is not correctly stored at the time of manufacturing, if a recording or reproducing operation is performed after being assembled as a recording apparatus, a reproducing apparatus, or a recording/reproducing apparatus, the recording or reproducing operation can not be correctly performed as an inevitable consequence. If a problem is specified during an encryption or decryption process, it is difficult to further narrow down its cause in many cases due to the complicated encryption or decryption process as described above.
The embodiment is characterized in that it is possible to easily confirm whether or not the drive unique key is correctly stored into, for example, a nonvolatile memory 401 using a control CPU 400 of
The following alternative method may be employed. At the time when whether or not the drive unique key is correctly stored becomes a problem, the control CPU 400 checks the storage of the drive unique key with firmware of the apparatus in response to the command from the input terminal 402a, and generates the flag in accordance with the result to output the same to the output terminal 402b. In this way, it is possible to easily confirm the state of the drive unique key.
Next, a flow of the above-described operation will be described with reference to
In the case of
In the explanation of
Further, the present invention can be applied to a reproducing-only apparatus without a recording function and a recording-only apparatus without a reproducing function as well as a recording/reproducing apparatus, which falls within a range of the present invention.
While we have shown and described several embodiments in accordance with our invention, it should be understood that disclosed embodiments are susceptible of changes and modifications without departing from the scope of the invention. Therefore, we do not intend to be bound by the details shown and described herein but intend to cover all such changes and modifications that fall within the ambit of the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
2008-170612 | Jun 2008 | JP | national |