These and other objects, advantages and features of the invention will become apparent from the following description thereof taken in conjunction with the accompanying drawings that illustrate a specific embodiment of the invention. In the Drawings:
A storage medium control system according to a first embodiment of the present invention will be described with reference to drawings.
A storage medium control system 20 is provided with a mobile phone 10 and a copyright-protection-function-equipped memory card 11 to be mounted in the mobile phone 10.
The mobile phone 10 acquires an encryption key from the memory card 11 and sets it for the mobile phone 10. The mobile phone 10 acquires contents which have been encrypted (hereinafter referred to as “encrypted contents”) from the memory card 11. The mobile phone 10 decrypts the acquired video contents or audio contents and reproduces the decrypted video contents or audio contents.
Alternatively, the mobile phone 10 encrypts video contents or audio contents delivered from a contents distribution apparatus 12 via a TV broadcast network 13, the Internet 14, or a mobile phone network 15 and records the encrypted contents in the memory card 11 together with the encryption key.
Note that, though the memory card 11 is assumed to be the storage medium in
The mobile phone 10 is assumed to be a storage medium control apparatus which controls the storage medium. However, the storage medium control apparatus for realizing the storage medium control system is not limited to the mobile phone 10. It may be any other storage medium control apparatus, such as a TV set, a DVD recorder, or a digital still camera.
The storage medium control system 20 is provided with a storage medium 121 and a storage medium control apparatus 100. The memory card 11 shown in
The storage medium 121 is a medium which stores data and is configured by a normal area 123, an authentication area 124, and a data sending/receiving control device 122.
The normal area 123 is a storage area which can be accessed without performing mutual authentication with the storage medium control apparatus 100, and it is a storage area for storing data including unencrypted plain text contents 125 and encrypted contents 126.
The authentication area 124 is a storage area which can be accessed after mutual authentication is performed with the storage medium control apparatus 100, and it includes a right information storage area 127 inside it. The right information storage area 127 is a storage area for storing right information about the encrypted contents 126 stored in the normal area 123.
The data sending/receiving control device 122 is a processing unit which performs input/output control of the data stored in the normal area 123 and the authentication area 124 on the basis of a data read or write request from the storage medium control apparatus 100.
The storage medium control apparatus 100 is an apparatus which reads and writes data to and from the storage medium 121, and it is provided with a normal mode unit 106, a secure mode unit 101, and a data sending/receiving control device 108.
The storage medium control apparatus 100 is provided with a common Central Processing Unit (CPU), a memory, and the like, and it realizes the normal mode unit 106 and the secure mode unit 101 described above by executing a program stored in the memory.
The data sending/receiving control device 108 is configured by hardware.
Note that, since other components are not directly related to the present invention, they are not shown, and a description thereof is omitted.
The data sending/receiving control device 108 is provided with a normal resource 110 and a secure resource 109.
The normal resource 110 is a processing unit for reading data from the storage medium 121 and writing data to the storage medium 121.
The secure resource 109 is a processing unit which performs the mutual authentication with the storage medium 121 using data specified by the normal resource 110. The secure resource 109 also decrypts the encrypted contents 126 read from the normal area 123. Furthermore, the secure resource 109 encrypts unencrypted contents which are used within the storage medium control apparatus 100.
The normal mode unit 106 is a processing unit realized by executing a general-purpose Operating System (OS) represented by Linux® on the CPU, and it is provided with a normal mode switching control unit 107.
The normal mode switching control unit 107 is a software module which performs a processing for switching between a normal mode and a secure mode, and it sends and receives data between the normal mode unit 106 and the secure mode unit 101.
Here, the “normal mode” refers to a mode in which the secure resource 109 cannot be accessed and in which only the normal resource 110 can be accessed.
The “secure mode” refers to a mode in which the secure resource 109 can be accessed. Note that, in the “secure mode” in the present embodiment, it is also possible to access the normal resource 110.
The secure mode unit 101 is a processing unit realized by executing a secure OS on the CPU, and it is provided with an encryption control unit 105, a storage medium control unit 104, a storage medium processing unit 103, and a secure mode switching control unit 102.
The encryption control unit 105 is a software module which controls the secure resource 109 to execute a mutual authentication processing between the storage medium 121 and the storage medium control apparatus 100, and to perform encryption and decryption of contents.
The storage medium control unit 104 is a software module which controls data writing to and data reading from the normal area 123 and the authentication area 124 inside the storage medium 121 via the normal resource 110, and controls the encryption control unit 105.
The storage medium processing unit 103 is a software module which performs access to the storage medium 121, mutual authentication between the storage medium 121 and the storage medium control apparatus 100, and encryption and decryption of contents data, via the storage medium control unit 104 and the encryption control unit 105.
The secure mode switching control unit 102 is a software module which switches between the normal mode and the secure mode, and sends and receives the data between the normal mode unit 106 and the secure mode unit 101.
Next, a control processing of the storage medium 121 from the secure mode unit 101 will be described.
As the scenes where it is assumed that the above processing is performed, various scenes are assumed, such as a case of inserting the memory card 11 into the mobile phone 10 to reproduce encrypted contents recorded in the memory card 11 and a case of inserting the memory card 11 into the mobile phone 10 to record the encrypted contents in the memory card 11. Note that timing of executing the above processing depends on the storage medium control apparatus 100 such as the mobile phone 10, and the processing may be executed at any timing.
When a request to access the storage medium 121 is issued by the storage medium control apparatus 100 (S2: YES), the normal mode switching control unit 107 sends a command to the secure mode switching control unit 102 to switch from the normal mode to the secure mode (S4). When a request to access the storage medium 121 is not issued (S2: NO), the processing normally ends.
When the secure mode switching control unit 102 receives the command from the normal mode switching control unit 107, it is assumed that the transition from the normal mode to the secure mode has succeeded (S6: YES). When the secure mode switching control unit 102 cannot receive the command from the normal mode switching control unit 107, it is assumed that the transition to the secure mode has failed (S6: NO), and the storage medium control apparatus 100 abnormally ends.
When transition to the secure mode has succeeded (S6: YES), the secure mode switching control unit 102 performs a processing on the basis of the command received from the normal mode switching control unit 107.
When the received command is a command to access the normal area 123 of the storage medium 121 (S8: YES), the secure mode switching control unit 102 sends, to the storage medium processing unit 103, a command to request access to the normal area 123 (S10).
After confirming that the received command is a command to request the access to the normal area 123, the storage medium processing unit 103 sends, to the storage medium control unit 104, the command to request the access to the normal area 123 (S10). After confirming that the received command is a command to access the normal area 123, the storage medium control unit 104 controls the normal resource 110 of the data sending/receiving control device 108 to send, to the storage medium 121 via a data bus 128, the command to access the normal area 123 (S10).
After the data sending/receiving control device 122 receives the access command sent from the normal resource 110, and the storage medium 121 confirms that the received access command is a command to access the normal area 123, the storage medium 121 accesses the normal area 123 and sends the access result to the normal resource 110 via the data sending/receiving control device 122 and the data bus 128.
The normal resource 110 receives the access result from the data sending/receiving control device 122 (S12). The normal resource 110 which has received the access result notifies the storage medium control unit 104 that the access to the normal area 123 has completed and it has received the access result (S14).
When the result of the access to the normal area 123 received from the normal resource 110 by the storage medium control unit 104 indicates success (S16: YES), the processing proceeds to S18. When the result of the access to the normal area 123 received from the normal resource 110 indicates failure (S16: NO), the storage medium control apparatus 100 abnormally ends.
When the data of the normal area 123 read at S12 is the encrypted contents 126 (S18: YES), the storage medium processing unit 103 sends, to the storage medium control unit 104, a command to read an encryption key for encrypting the read data of the normal area 123, which is stored in the authentication area 124. The storage medium control unit 104 controls the normal resource 110 to send, to the storage medium 121, the command to read the encryption key from the authentication area 124 (S20).
After confirming that the command received by the data sending/receiving control device 122 is a command to read encryption key data from the authentication area 124, the storage medium 121 reads the encryption key from the authentication area 124 and sends the encryption key to the normal resource 110 via the data bus 128 (S20).
The normal resource 110 sends the received encryption key to the storage medium control unit 104, and the storage medium control unit 104 sends the received encryption key to the storage medium processing unit 103 (S20).
The storage medium processing unit 103 sends the encryption key received from the storage medium control unit 104 to the encryption control unit 105 (S20).
The encryption control unit 105 sets the received encryption key for the secure resource 109, and notifies a setting completion notification to the encryption control unit 105 (S20). The encryption control unit 105 notifies the setting completion notification to the storage medium processing unit 103 (S20).
The storage medium processing unit 103 which has received the setting completion notification from the encryption control unit 105 sends the encrypted contents 126 which have been read to the encryption control unit 105 and notifies a command to decrypt the data to the encryption control unit 105 (S22).
When the received command is a command to decrypt the data, and an encryption key corresponding to the encrypted contents 126 received in advance is set for the secure resource 109, the encryption control unit 105 sends the received encrypted contents 126 and the command to decrypt the data to the secure resource 109 (S22).
When the received command is a command to decrypt the data, the secure resource 109 decrypts the received encrypted contents 126 with the previously set encryption key corresponding to the encrypted data of the normal area 123 (S22).
When the decryption completes and succeeds, the secure resource 109 sends the decrypted encrypted contents 126 to the encryption control unit 105, and the encryption control unit 105 sends them to the storage medium processing unit 103 (S22). When the decryption fails, the secure resource 109 sends the decryption failure result to the encryption control unit 105, and the encryption control unit 105 sends it to the storage medium processing unit 103 (S22).
When receiving the decryption failure result from the encryption control unit 105 (S24: NO), the storage medium processing unit 103 proceeds to an abnormality processing.
When receiving the decrypted encrypted contents 126 from the encryption control unit 105 (S24: YES), the storage medium processing unit 103 proceeds to S26.
When the data of the normal area 123 read at S12 is unencrypted plain text contents 125 (S18: NO), the storage medium processing unit 103 proceeds to S26.
The storage medium processing unit 103 performs various processings for the plain text contents 125 read at S12, the decrypted encrypted contents 126, and the data of the normal area 123 (S26). After completion of the processings, the storage medium processing unit 103 proceeds to S28.
When there is any other data of the normal area 123 to be processed (S28: YES), the storage medium processing unit 103 proceeds to S10.
When there is not any other data of the normal area 123 to be processed (S28: NO), the storage medium processing unit 103 proceeds to normal end.
When the command received from the normal mode switching control unit 107 is a command to access the authentication area 124 of the storage medium 121 (S8: NO; S30: YES), the secure mode switching control unit 102 sends, to the storage medium processing unit 103, a command to request the access to the authentication area 124 (S32).
After confirming that the received command is a command to access the authentication area 124, the storage medium processing unit 103 sends, to the storage medium control unit 104, a command to acquire data for performing the mutual authentication with the storage medium 121 (S34).
After confirming that the received command is a command to acquire the data for the mutual authentication, the storage medium control unit 104 controls the normal resource 110 to send the data-for-mutual-authentication acquisition command to the storage medium 121 via the data bus 128 (S34).
When the received command is a data-for-mutual-authentication acquisition command, the storage medium 121 sends the result of the data-for-mutual-authentication acquisition command (the data for the mutual authentication acquired on the basis of the data-for-mutual-authentication acquisition command) to the normal resource 110.
The normal resource 110 receives the result of the data-for-mutual-authentication acquisition command from the storage medium 121 (S36). Furthermore, the normal resource 110 notifies the result of the data-for-mutual-authentication acquisition command received from the storage medium 121 to the storage medium control unit 104, and the storage medium control unit 104 notifies the received result to the storage medium processing unit 103 (S36).
When the received result of the data-for-mutual-authentication acquisition command indicates abnormality (S38: NO), the storage medium processing unit 103 proceeds to the abnormality processing.
When the received result of the data-for-mutual-authentication acquisition command indicates normality (S38: YES), the storage medium processing unit 103 sends, to the encryption control unit 105, a part of the received result of the data-for-mutual-authentication acquisition command required for mutual authentication or all of the received result of the data-for-mutual-authentication acquisition command together with a mutual authentication command (S40).
After confirming that the received command is a mutual authentication command, the encryption control unit 105 sends a part or all of the received data for mutual authentication and the mutual authentication command to the secure resource 109 (S40).
After confirming that the secure resource 109 has received the mutual authentication command and a part or all of the data for mutual authentication, it executes a mutual authentication processing and returns the result of the mutual authentication processing to the encryption control unit 105 (S42).
The encryption control unit 105 notifies the result of the mutual authentication processing to the storage medium processing unit 103. When the received result of the mutual authentication processing indicates abnormality (S44; NO), the storage medium processing unit 103 proceeds to the abnormality processing.
When the received result of the mutual authentication processing indicates normality (S44: YES), the storage medium processing unit 103 sends, to the storage medium control unit 104, a command to request access to the authentication area 124. After confirming that the received command is a command to access the authentication area 124, the storage medium control unit 104 controls the normal resource 110 of the data sending/receiving control device 108 to send, to the storage medium 121 via the data bus 128, the command to access the authentication area 124 (S46).
The storage medium 121 receives the access command sent from the normal resource 110 by the data sending/receiving control device 122. After confirming that the received access command is a command to access the authentication area 124, the storage medium 121 accesses the authentication area 124 and sends the access result to the normal resource 110 via the data sending/receiving control device 122 and the data bus 128.
The normal resource 110 receives the access result from the data sending/receiving control device 122 (S48). The normal resource 110 which has received the access result notifies the storage medium control unit 104 that the access to the authentication area 124 has completed and that it has received the access result (S50).
The storage medium control unit 104 judges whether the access result indicates success or failure. When the result of accessing the authentication area 124, which has been received from the normal resource 110, indicates success (S52: YES), the processing proceeds to S54. When the result of accessing the authentication area 124, which has been received from the normal resource 110, indicates failure (S52: NO), the storage medium control apparatus 100 abnormally ends.
When the data of the authentication area 124 read at S48 is encrypted (S54: YES), the storage medium processing unit 103 sends the read data of the authentication area 124 to the encryption control unit 105 and requests a decryption processing (S56).
The encryption control unit 105 sends the received data of the authentication area 124 to the secure resource 109 and controls the secure resource 109 to decrypt the received data of the authentication area 124 (S56).
The encryption control unit 105 controls the secure resource 109 to send the decrypted data of the authentication area 124 to the storage medium processing unit 103 (S56). The encryption control unit 105 controls the secure resource 109 to send a decryption failure result to the storage medium processing unit 103 when the decryption of the data of the authentication area 124 fails (S56).
When receiving the decrypted data of the authentication area 124 (S58: YES), the storage medium processing unit 103 proceeds to S60.
When receiving the decryption failure result from the encryption control unit 105 (S58: NO), the storage medium processing unit 103 proceeds to the abnormality processing.
When the data of the authentication area 124 read at S48 is the unencrypted plain text contents 125 (S54: NO), the storage medium processing unit 103 proceeds to S60.
The storage medium processing unit 103 performs various processings for the plain text contents 125 read at S48, the decrypted encrypted contents 126, and the data of the authentication area 124 (S60). After completion of the processings, the storage medium processing unit 103 proceeds to S62.
When there is any other data of the authentication area 124 to be processed (S62: YES), the storage medium processing unit 103 proceeds to S46.
When there is not any other data of the authentication area 124 to be processed (S62: NO), the storage medium processing unit 103 proceeds to the normal end.
As described above, according to the present embodiment, it is possible to directly access the normal resource 110 from the secure mode unit 101 even in the secure mode. Therefore, it is not necessary to perform the switching to the normal mode when accessing the data stored in the storage medium 121 in the secure mode. Accordingly, it is possible to reduce the number of times of switching between the secure mode and the normal mode. Furthermore, it is possible to perform the processing without the normal mode unit 106 handling the copyright protection information (the right information). Accordingly, it is possible to improve the processing performance while protecting the copyright protection information (the right information) in the security mode.
A storage medium control system according to a second embodiment of the present invention will be described with reference to drawings.
An aspect of utilization of the storage medium control system is similar to what is shown in
The storage medium control system 20 is provided with a storage medium 121 and a storage medium control apparatus 200.
The storage medium 121 is similar to what is shown in the first embodiment. Therefore, a detailed description thereof is not repeated here.
As for the storage medium control apparatus 200, a description will be made mainly on differing points from the storage medium control apparatus 100 according to the first embodiment shown in
The storage medium control apparatus 200 is an apparatus which reads and writes data to and from the storage medium 121, and it is provided with a normal mode unit 206, a secure mode unit 201, and a data sending/receiving control device 210.
The storage medium control apparatus 200 is provided with a common CPU, a memory, and the like, and it realizes the normal mode unit 206 and the secure mode unit 201 described above by executing programs stored in the memory.
The data sending/receiving control device 210 is configured by hardware.
Note that, since other components are not directly related to the present invention, they are neither illustrated nor described.
The secure mode unit 201 is provided with a secure mode switching control unit 202, a storage medium authentication area processing unit 203, a storage medium authentication area control unit 204, and an encryption control unit 205.
The normal mode unit 206 is provided with a normal mode switching control unit 207, a storage medium normal area processing unit 208, and a storage medium normal area control unit 209.
The data sending/receiving control device 210 is provided with a secure resource 211 and a normal resource 212.
The storage medium normal area control unit 209 and the storage medium authentication area control unit 204 correspond to the storage medium control unit 104 in the storage medium control apparatus 100, and they are software modules which control, via the normal resource 212, reading and writing of data to and from the normal area 123 and the authentication area 124 inside the storage medium 121, and also control the encryption control unit 205.
The storage medium normal area control unit 209 is a software module which accesses only the normal area 123 of the storage medium 121 via the normal resource 212.
The storage medium authentication area control unit 204 is a software module which accesses only the authentication area 124 of the storage medium 121 via the normal resource 212 and the secure resource 211.
The storage medium normal area processing unit 208 and the storage medium authentication area processing unit 203 correspond to the storage medium processing unit 103 in the storage medium control apparatus 100, and they are software modules which perform access to the storage medium 121, mutual authentication between the storage medium 121 and the storage medium control apparatus 200, and encryption and decryption of contents data, via the storage medium normal area processing unit 208, the storage medium authentication area control unit 204, and the encryption control unit 205.
The storage medium normal area processing unit 208 is a software module which performs a processing of data of the normal area 123 of the storage medium 121 via the storage medium normal area control unit 209.
The storage medium authentication area processing unit 203 is a software module which performs a processing of the data of the authentication area 124 of the storage medium 121 via the storage medium authentication area control unit 204.
That is, what differs from the first embodiment is that the storage medium normal area control unit 209 and the storage medium normal area processing unit 208 exist in the normal mode unit 206, and the storage medium authentication area control unit 204 and the storage medium authentication area processing unit 203 exist in the secure mode unit 201.
Other configuration requirements, that is, the secure mode switching control unit 202, the encryption control unit 205, the normal mode switching control unit 207, the data sending/receiving control device 210, the secure resource 211, and the normal resource 212 respectively correspond to the secure mode switching control unit 102, the encryption control unit 105, the normal mode switching control unit 107, the data sending/receiving control device 108, the secure resource 109, and the normal resource 110 shown in
Next, a control processing for the storage medium 121 performed by both the secure mode unit 201 and the normal mode unit 206 will be described.
As the scenes where it is assumed that the above processing is performed, various scenes are assumed, such as a case of inserting the memory card 11 into the mobile phone 10 to reproduce encrypted contents recorded in the memory card 11 and a case of inserting the memory card 11 into the mobile phone 10 to record the encrypted contents in the memory card 11. Note that the timing of performing the above processing depends on the storage medium control apparatus 100 such as the mobile phone 10, and the processing may be performed at any timing.
When a request to access the storage medium 121 is issued by the storage medium control apparatus 200 (S102: YES), and it can be confirmed that access to the authentication area of the storage medium 121 has occurred (S104: YES), the normal mode switching control unit 207 sends a command to the secure mode switching control unit 202 to switch from the normal mode to the secure mode (S106). When the request to access the authentication area of the storage medium 121 has not been issued (S104: NO), the processing proceeds to S148.
When the secure mode switching control unit 202 receives the command from the normal mode switching control unit 207, it is assumed that the transition from the normal mode to the secure mode has succeeded (S108: YES). When the secure mode switching control unit 202 of the secure mode unit 201 cannot receive the command from the normal mode switching control unit 207 of the normal mode unit 206, it is assumed that the transition to the secure mode has failed (S108: NO), and the storage medium control apparatus 200 abnormally ends.
The secure mode switching control unit 202 performs processing on the basis of the command received from the normal mode switching control unit 207. However, when the received command is a command to access the authentication area 124 of the storage medium 121, the secure mode switching control unit 202 sends, to the storage medium authentication area processing unit 203, a command to request the access to the authentication area 124 (S112).
After confirming that the received command is a command to access the authentication area 124, the storage medium authentication area processing unit 203 sends, to the storage medium authentication area control unit 204, a command to acquire data for performing the mutual authentication with the storage medium 121 (S114).
After confirming that the received command is a data-for-mutual-authentication acquisition command, the storage medium authentication area control unit 204 controls the normal resource 212 to send the data-for-mutual-authentication acquisition command to the storage medium 121 via the data bus 128 (S114).
When the received command is a data-for-mutual-authentication acquisition command, the storage medium 121 sends the result of the data-for-mutual-authentication acquisition command to the normal resource 212.
The normal resource 212 notifies the result of the data-for-mutual-authentication acquisition command received from the storage medium 121 to the storage medium authentication area control unit 204 (S116), and the storage medium authentication area control unit 204 notifies it to the storage medium authentication area processing unit 203 (S116).
When the received result of the data-for-mutual-authentication acquisition command indicates abnormality (S118: NO), the storage medium authentication area processing unit 203 proceeds to an abnormality processing.
When the result of the received data-for-mutual-authentication acquisition command indicates normality (S118: YES), the storage medium authentication area processing unit 203 sends, to the encryption control unit 205, a part of the received result of the data-for-mutual-authentication acquisition command required for mutual authentication or all of the received result of the data-for-mutual-authentication acquisition command together with the mutual authentication command (S120).
After confirming that the received command is a mutual authentication command, the encryption control unit 205 sends a part or all of the received data for mutual authentication and the mutual authentication command to the secure resource 211 (S120).
After confirming that the secure resource 211 has received the mutual authentication command and a part or all of the data for mutual authentication, it executes a mutual authentication processing and returns the result of the mutual authentication processing to the encryption control unit 205 (S122).
The encryption control unit 205 notifies the result of the mutual authentication processing to the storage medium authentication area processing unit 203. When the received result of the mutual authentication processing indicates abnormality (S124: NO), the storage medium authentication area processing unit 203 proceeds to the abnormality processing.
When the received result of the mutual authentication processing indicates normality (S124: YES), the storage medium authentication area processing unit 203 sends, to the storage medium authentication area control unit 204, a command to request access to the authentication area 124 (S126). After confirming that the received command is a command to access the authentication area 124, the storage medium authentication area control unit 204 controls the normal resource 212 of the data sending/receiving control device 210 to send, to the storage medium 121 via the data bus 128, a command to access the authentication area 124 (S126).
The storage medium 121 receives the access command sent from the normal resource 212 by the data sending/receiving control device 122. After confirming that the received access command is a command to access the authentication area 124, the storage medium 121 accesses the authentication area 124 and sends the access result to the normal resource 212 via the data sending/receiving control device 122 and the data bus 128 (S128).
The normal resource 212 which has received the access result from the normal resource 212 notifies the storage medium authentication area control unit 204 that the access to the authentication area 124 has completed and that it has received the access result (S130).
When the result of the access to the authentication area 124 received from the normal resource 212 indicates success (S132: YES), the storage medium authentication area control unit 204 proceeds to S134. When the result of the access to the authentication area 124 received from the normal resource 212 indicates failure (S132: NO), the storage medium control apparatus 200 abnormally ends.
When the data of the authentication area 124 read at S128 is encrypted (S134: YES), the storage medium authentication area processing unit 203 sends, to the storage medium authentication area control unit 204, a command to read an encryption key stored in the authentication area 124 (S136).
The storage medium authentication area control unit 204 controls the normal resource 212 to send, to the storage medium 121, the command to read an encryption key from the authentication area 124 (S136).
After confirming that the command received by the data sending/receiving control device 122 is a command to read encryption key data from the authentication area 124, the storage medium 121 reads the encryption key from the authentication area 124 and sends the encryption key to the normal resource 212 via the data bus 128 (S136).
The normal resource 212 sends the received encryption key to the storage medium authentication area control unit 204, and the storage medium authentication area control unit 204 sends the received encryption key to the storage medium authentication area processing unit 203 (S136).
The storage medium authentication area processing unit 203 sends the encryption key received from the storage medium authentication area control unit 204 to the encryption control unit 205 (S136).
The encryption control unit 205 sets the received encryption key for the secure resource 211, and notifies a setting completion notification to the encryption control unit 205. The encryption control unit 205 notifies the setting completion notification to the storage medium authentication area processing unit 203 (S136).
The storage medium authentication area processing unit 203 sends the read data of the authentication area 124 to the encryption control unit 205 and requests the decryption processing (S138).
The encryption control unit 205 sends the received data of the authentication area 124 to the secure resource 211, and controls the secure resource 211 to decrypt the received data of the authentication area 124 (S138).
The encryption control unit 205 controls the secure resource 211 to send the decrypted data of the authentication area 124 to the storage medium authentication area processing unit 203 (S138). The encryption control unit 205 controls the secure resource 211 to send a decryption failure result to the storage medium authentication area processing unit 203 when the decryption of the data of the authentication area 124 failed (S140: NO).
When receiving the decryption failure result from the encryption control unit 205 (S140: NO), the storage medium authentication area processing unit 203 proceeds to the abnormality processing.
When receiving the decrypted data of the authentication area 124 (S140: YES), the storage medium authentication area processing unit 203 proceeds to S142.
The storage medium authentication area processing unit 203 performs various processings for the read plain text contents 125, the decrypted encrypted contents 126, and the data of the authentication area 124 (S142).
When there is any other data of the authentication area 124 to be processed (S144: YES), the storage medium authentication area processing unit 203 proceeds to S10.
When there is not any other data of the authentication area 124 to be processed (S144: NO), the storage medium authentication area processing unit 203 proceeds to S146.
When the normal area 123 of the storage medium 121 is not accessed (S146: NO), the storage medium control apparatus 200 normally ends.
When the normal area 123 of the storage medium 121 is accessed (S146: YES), the secure mode switching control unit 202 sends a command to the normal mode switching control unit 207 to switch to the normal mode (S148). When the normal mode switching control unit 207 receives the command from the secure mode switching control unit 202, a return from the secure mode unit 201 to the normal mode unit 206 is successful (S150: YES).
When the normal mode switching control unit 207 cannot receive the command from the secure mode switching control unit 202, it is assumed that the return to the normal mode failed (S150: NO), and the storage medium control apparatus 200 abnormally ends.
After confirming that the received command is a command to access the normal area 123, the storage medium normal area processing unit 208 sends, to the storage medium normal area control unit 209, a command to request the access to the normal area 123 (S152). After confirming that the received command is a command to access the normal area 123, the storage medium normal area control unit 209 controls the normal resource 212 of the data sending/receiving control device 210 to send, to the storage medium 121 via a data bus 128, a command to access the normal area 123 (S152).
The storage medium 121 receives the access command sent from the normal resource 212 by the data sending/receiving control device 122. After confirming that the received access command is a command to access the normal area 123, the storage medium 121 accesses the normal area 123 and sends the access result to the normal resource 212 via the data sending/receiving control device 122 and the data bus 128.
The normal resource 212 receives the access result from the data sending/receiving control device 122 (S154). The normal resource 212 which has received the access result notifies the storage medium normal area control unit 209 that the access to the normal area 123 has completed and it has received the access result (S156).
When the result of the access to the normal area 123 received by the storage medium control unit 209 from the normal resource 212 indicates success (S158: YES), the processing proceeds to S160. When the result of the access to the normal area 123 received from the normal resource 212 indicates failure (S158: NO), the storage medium control apparatus 200 abnormally ends.
When the decryption processing of the encrypted contents 126 stored in the normal area is performed by the storage medium normal area processing unit 208, and an encryption key corresponding to the encrypted contents 126 is set for the secure resource 211 in advance in the secure mode (S160: YES), the received encrypted contents 126 and a command to decrypt the data are sent to the normal resource 212 (S162).
When the received command is a command to decrypt the data, the normal resource 212 decrypts the received encrypted contents 126 with the encryption key corresponding to the encrypted data of the normal area 123, which has been set in advance, via the secure resource 211 (S162). However, though the decryption processing is actually performed by the secure resource 211, the processing for setting for the secure resource 211 is not performed. Therefore, it is possible to perform the processing by the normal mode unit 206.
After the decryption is successfully completed, the normal resource 212 sends the decrypted encrypted contents 126 to the storage medium normal area control unit 209, and the storage medium normal area control unit 209 sends them to the storage medium normal area processing unit 208 (S162). When the decryption fails, the normal resource 212 sends the decryption failure result to the storage medium normal area control unit 209, and the storage medium normal area control unit 209 sends the received decryption failure result to the storage medium normal area processing unit 208 (S162).
When receiving the decryption failure result from the storage medium normal area control unit 209 (S164: NO), the storage medium normal area processing unit 208 proceeds to the abnormality processing.
When receiving the decrypted encrypted contents 126 from the storage medium normal area control unit 209 (S164: YES), the storage medium normal area processing unit 208 proceeds to S166.
The storage medium authentication area processing unit 203 performs various processings for the read plain text contents 125, the decrypted encrypted contents 126, and the data of the normal area 123 (S166).
When there is any other data of the normal area 123 to be processed (S168: YES), the storage medium normal area processing unit 208 proceeds to S152.
When there is not any other data of the normal area 123 to be processed (S168: NO), the storage medium normal area processing unit 208 proceeds to normal end.
As described above, according to the present embodiment, it is possible to directly access the normal resource 212 from the secure mode unit 201, similarly to the first embodiment. Therefore, it is not necessary to perform the switching to the normal mode when accessing the data stored in the storage medium 121 in the secure mode. Accordingly, it is possible to reduce the number of times of switching between the secure mode and the normal mode.
Furthermore, it is possible to easily add the secure mode unit 201 and the data sending/receiving control device 210 while avoiding a modification of the software modules of the normal mode unit 206 configured by an existing general-purpose OS as much as possible. Therefore, it is possible to easily add a function of accessing the authentication area 124 of the storage medium 121 to an existing storage medium control system which accesses the normal area 123 of the storage medium 121.
A storage medium control system according to a third embodiment of the present invention will be described with reference to drawings.
A configuration of the storage medium control system according to the third embodiment is similar to that of the storage medium control system according to the second embodiment shown in
Next, a control processing for a storage medium 121 performed by both a secure mode unit 201 and a normal mode unit 206 will be described.
Though the basic processing is similar to that of the second embodiment, a storage medium authentication area control unit 204 acquires storage medium information to be described later, in order to keep the consistency between access to an authentication area 124 from the secure mode unit 201 and access to an normal area 123 from the normal mode unit 206. The present embodiment also differs from the second embodiment in that the storage medium 121 is accessed on the basis of the storage medium information.
Hereinafter, a description will be made mainly on the different processings.
In the present embodiment, it is assumed that a shared memory (not shown) which is shared by the secure mode unit 201 and the normal mode unit 206 is provided in the storage medium control apparatus 200. The storage medium information acquired by the storage medium authentication area control unit 204 is stored in the shared memory and shared by the secure mode unit 201 and the normal mode unit 206.
With reference to
When the initialization processing has not succeeded (S202: NO), the storage medium normal area processing unit 208 sends a request to initialize the storage medium 121 to a storage medium normal area control unit 209. On the basis of the initialization request, the storage medium normal area control unit 209 acquires “storage medium information” such as address information, area size, and access size about the storage medium 121, notifies the information to the storage medium normal area processing unit 208 (S203), and proceeds to S204.
When the initialization processing has already succeeded (S202: YES) or after S203 is executed, the acquired storage medium information is stored at a particular address of the shared memory which can be commonly accessed by the normal mode unit 206 and the secure mode unit 201 (S204).
With reference to
As described above, according to the present embodiment, the storage medium information is designed to be stored in the shared memory which can be accessed by both the secure mode unit 201 and the normal mode unit 206, in addition to the advantages of the embodiments described above. Therefore, the initialization processing for a storage medium may be performed only in any one of the normal mode and the secure mode.
In the storage medium control system according to the third embodiment, the storage medium authentication area control unit 204 of the secure mode unit 201 may independently acquire the storage medium information without using the shared memory.
That is, the storage medium control system according to the third embodiment may perform the processings shown in
With reference to
According to a first modification, the storage medium authentication area control unit 204 can acquire the storage medium information independently from the storage medium normal area control unit 209. Therefore, the operation is possible without synchronizing the storage medium normal area control unit 209 and the storage medium authentication area control unit 204, so that the processing can be speeded up.
In the storage medium control system according to the third embodiment, the storage medium information may be encrypted and handed from the normal mode unit 206 to the secure mode unit 201 using the shared memory.
That is, the storage medium control system according to the third embodiment may execute the processings shown in
First, it is assumed that a common secret key used for cryptography is shared by the storage medium normal area processing unit 208 and the storage medium authentication area processing unit 203.
With reference to
When the initialization processing has not succeeded (S202: NO), the storage medium normal area processing unit 208 issues a request to initialize the storage medium 121 to the storage medium normal area control unit 209. On the basis of the initialization request, the storage medium normal area control unit 209 acquires “storage medium information” such as the address information, the area size, and the access size about the storage medium 121, notifies the information to the storage medium normal area processing unit 208 (S203), and proceeds to S404.
When the initialization processing has already succeeded (S202: YES) or after S203 is executed, an encryption processing is performed for the acquired storage medium information using the common secret key in accordance with a particular algorithm to generate encrypted storage medium information (S404).
The encrypted storage medium information is stored at a particular address of the shared memory which can be commonly accessed by the normal mode unit 206 and the secure mode unit 201 (S405).
With reference to
According to a second modification, by encrypting data when the data is sent and received between the storage medium normal area control unit 209 and the storage medium authentication area control unit 204, it is possible to improve the strength of security of data in sending/receiving of the data.
A storage medium control system according to a fourth embodiment of the present invention will be described with reference to drawings.
A configuration of the storage medium control system according to the fourth embodiment is similar to that of the storage medium control system according to the second embodiment shown in
Next, a method for controlling a storage medium 121 by both a secure mode unit 201 and a normal mode unit 206 will be described.
Though a basic processing is similar to that of the second embodiment, the present embodiment differs from the second embodiment in that it includes a processing for confirming which area is being accessed so as to avoid a conflict between access to the authentication area 124 of the storage medium 121 and access to the normal area 123 of the storage medium 121, in order to keep the consistency between access to the authentication area 124 from the secure mode unit 201 and access to the normal area 123 from the normal mode unit 206.
Hereinafter, a description will be made below mainly on the different processes.
Since the processing in
With reference to
When it is judged that the normal area 123 is accessed (S503: YES), the storage medium control apparatus 200 abnormally ends at once. Alternatively, there is no problem that, instead of the abnormal end, the storage medium control apparatus 200 keep the processing waiting for a predetermined time to wait until the access to the normal area 123 ends, and then the flow proceeds to S106 to transition to the secure mode.
On the contrary, with reference to
When it is judged that the authentication area 124 is accessed (S511: YES), the storage medium control apparatus 200 abnormally ends at once. Alternatively, there is no problem that, instead of the abnormal end, the storage medium control apparatus 200 keeps the processing waiting for a predetermined time to wait until the access to the authentication area 124 ends, and then the flow proceeds to S152.
As described above, according to the fourth embodiment, it is possible to perform exclusive control so that the storage medium normal area control unit 209 and the storage medium authentication area control unit 204 do not access the storage medium 121 at the same time, in addition to the operation and advantages of the embodiments described above.
In the storage medium control system according to the fourth embodiment, it is also possible to hold a state of access to a storage medium in a shared memory (not shown) which can be accessed from both the secure mode unit 201 and the normal mode unit 206, and to perform the exclusive control on the basis of the access state so that the storage medium normal area control unit 209 and the storage medium authentication area control unit 204 do not access the storage medium 121 at the same time.
That is, the storage medium control system according to the fourth embodiment may perform the processings shown in
With reference to
When transition to the secure mode is normally executed (S108: YES), the storage medium authentication area control unit 204 confirms whether or not a bit indicating a condition of access to the storage medium 121, which is stored at a particular address in the shared memory (hereinafter referred to as a “storage medium access bit”) is set to “accessed state” (S604). When the bit indicating the state of access to the storage medium 121 is set to “unaccessed state” (S604: YES), the storage medium access bit is set to the “accessed state” (S605). Then, the flow proceeds to S112 where data is sent and received to and from the storage medium 121.
When the storage medium access bit is set to the “accessed state” in advance (S604: NO), the storage medium control apparatus 200 abnormally ends at once. Alternatively, there is no problem that, instead of the abnormal end, the storage medium control apparatus 200 keeps the processing waiting for a predetermined time to wait until the access to the storage medium 121 ends, and then the flow proceeds to S112 to send and receive the data to and from the storage medium 121.
After that, when it is judged that there is no processing data in the storage medium authentication area (S144: NO), the storage medium authentication area control unit 204 sets the storage medium access bit set at S604 to the “unaccessed state” (S145). Thereby, the access to the storage medium 121 is enabled.
On the contrary, with reference to
When the storage medium access bit is set to the “accessed state” in advance (S611: NO), the storage medium control apparatus 200 abnormally ends at once. Alternatively, there is no problem that, instead of the abnormal end, the storage medium control apparatus 200 keeps the processing waiting for a predetermined time until the access to the storage medium 121 ends, and then the flow proceeds to S152 to send and receive data to and from the storage medium 121.
After that, when it is judged that there is no processing data in the normal area 123 of the storage medium 121 (S168: NO), the storage medium normal area control unit 209 sets the storage medium access bit set at S612 to the “unaccessed state” (S613). Thereby, the access to the storage medium 121 is enabled.
According to this modification, it is possible to perform the exclusive control so that the storage medium normal area control unit 209 and the storage medium authentication area control unit 204 do not access the storage medium 121 at the same time.
Furthermore, since the exclusive control is performed only by confirmation of a bit, the processing can be performed at a high speed.
A storage medium control system according to a fifth embodiment of the present invention will be described with reference to drawings.
A configuration of the storage medium control system according to the fifth embodiment is similar to that of the storage medium control system according to the second embodiment shown in
Next, a method for controlling a storage medium 121 by both a secure mode unit 201 and a normal mode unit 206 will be described.
Though a basic processing is similar to that of the second embodiment, the present embodiment differs from the second embodiment in that it includes a processing stage of preventing set values of a normal resource 212 set by a storage medium authentication area control unit 204 from being modified by a storage medium normal area control unit 209, and a processing stage of preventing the set values of the normal resource 212 set by the storage medium normal area control unit 209 from being modified by the normal resource 212, in order to keep the consistency between access to the authentication area 212 from the secure mode unit 201 and access to the normal area 209 from the normal mode unit 206. The “set values” refer to values about access bit width for accessing the storage medium 121, access size of data sent to or received from the storage medium 121, and the like.
Hereinafter, a description will be made mainly on different points. That is, there will be described a method for securing the independence of the set values by resetting the normal resource 212 and re-setting the register to be used each time the mode is switched.
Since the processing in
With reference to
When a processing for transitioning to the secure mode is normally performed (S108: YES), the storage medium authentication area control unit 204 performs a reset processing of the normal resource 212 which accesses the storage medium 121 (S704). That is, the set values of the registers of the normal resource 212 set by the storage medium normal area control unit 209 in advance are cleared. Then, the storage medium authentication area control unit 204 sets the set values to be used to access the storage medium 121 for the registers of the normal resource 212 (S704). Then, the flow proceeds to S112 where data is sent and received to and from the storage medium 121 on the basis of the set values set for the registers of the normal resource 212.
On the contrary, with reference to
As described above, according to the fifth embodiment, each of the storage medium normal area control unit 209 and the storage medium authentication area control unit 204 resets the registers of the normal resource 212 and sets the set values for the registers before accessing the storage medium 121, in addition to the operation and the advantages of the embodiments described above. Therefore, the storage medium authentication area control unit 204 can access the storage medium 121 without depending on the set values of the normal resource 212 set by the storage medium normal area control unit 209, and the storage medium normal area control unit 209 can access the storage medium 121 without depending on the set values of the normal resource 212 set by the storage medium authentication area control unit 204.
In the storage medium control system according to the fifth embodiment, independence of the set values of the normal mode and the secure mode may be secured by backing up the set values of the registers of the normal resource 212 used by the normal mode at the time of transition to the secure mode and restoring the backed-up set values on the registers at the time of exiting the secure mode.
That is, the storage medium control system according to the fifth embodiment may perform the processings shown in
With reference to
When a transition to the secure mode is normally executed (S108: YES), the storage medium authentication area control unit 204 backs up, in a particular memory area, all the current set values of the registers for which the setting is to be changed, among the registers of the normal resource 212 which accesses the storage medium 121 (S804). Then, the storage medium authentication area control unit 204 sets the set values for the registers of the normal resource 212 to be used for access to the storage medium 121 (S804). Then, the flow proceeds to S112 where data is sent and received to and from the storage medium 121 on the basis of the set values set for the registers of the storage medium 121.
After that, when it is judged that there is not any other data to be processed that is stored in the authentication area 124 of the storage medium 121 (S144: YES), the storage medium authentication area control unit 204 reads the set values backed up in the particular memory area at S804 and re-sets the set values for the registers of the normal resource 212 used to access the storage medium 121 (S809).
According to the first modification, it is not necessary to modify an existing storage medium normal area control unit 209.
In the storage medium control system according to the fifth embodiment, the normal resource may automatically switch the set values when the mode is switched.
The storage medium control system is provided with a storage medium control apparatus 300 and a storage medium 121.
The storage medium 121 is similar to what is shown in the first embodiment. Therefore, a detailed description thereof is not repeated here.
As for the storage medium control apparatus 300, a description will be made mainly on differing points from the storage medium control apparatus 200 shown in
The data sending/receiving control device 310 is provided with a secure resource 211, a normal resource 312, and a set value storage unit 313.
The set value storage unit 313 is a storage unit which stores set values to be used by the normal resource 312 to access the storage medium 121.
The normal resource 312 performs a processing similar to that of the normal resource 212. However, it is different in that it sets the set values stored in the set value storage unit 313 for its own registers when the mode is switched.
A method for controlling the storage medium 121 by the storage medium control apparatus 300 according to the second modification will be described below.
Hereinafter, a description will be made below mainly on the different processings.
Since the processing in
With reference to
When the registers of the normal resource 212 are registered with the set value storage unit 313 in transitioning to the secure mode at S106 (S904: YES), the normal resource 312 acquires the current set values of the registers from the normal resource 312, and backs up and stores them in the set value storage unit 313 (S905). When the registers of the normal resource 312 are not registered with the set value storage unit 313 (S904: NO), the normal resource 312 does not have to perform any processing.
With reference to
According to the second modification, the normal resource 312, which is hardware, performs backup and restoration of the set values when the mode is switched. Therefore, it is possible to make change in the set values accompanying switching of the mode, at a high speed.
A storage medium control system according to a sixth embodiment of the present invention will be described with reference to drawings.
A configuration of the storage medium control system in the sixth embodiment is the same as that of the storage medium control system according to the second embodiment shown in
Next, a method for controlling a storage medium 121 by both a secure mode unit 201 and a normal mode unit 206 will be described.
Though a basic processing is similar to that of the second embodiment, the present embodiment differs from the second embodiment in that the processing can be speeded up while cooperation is performed between access to an authentication area 124 from the secure mode unit 201 and access to a normal area 123 from the normal mode unit 206.
Hereinafter, a description will be made mainly on different points.
Here, a storage medium control apparatus 200 the power to which is repeatedly turned on and off by a power-saving mechanism or the like is assumed here. Note that it does not matter if the storage medium control apparatus 200 is an apparatus by which a reset processing of a storage medium is performed, specifically such an apparatus that insertion/removal of a storage medium occurs or an apparatus which performs resetting in the case of occurrence of an abnormal state. Furthermore, it is assumed that, as a method for a storage medium authentication area control unit 204 to acquire the storage medium access information, only storage medium access information is handed from the normal mode unit 206 to the secure mode unit 201 via a shared memory. Thereby, the access to the authentication area 124 is speeded up. Note that the “storage medium access information” is identification information identifying the storage medium 121 among storage medium information.
With reference to
When it is confirmed that the access is the first access to the storage medium 121 after the power is on (S1017: YES), it is confirmed whether or not the storage medium 121 has been initialized (S202). When the storage medium 121 has been initialized (S202: YES), the flow proceeds to S104, and the issuance of a request to access the authentication is confirmed as usual. Note that, though the judgment criteria is whether the access is the first access after the power is on here, “after the power is on” means “after the storage medium is reset.” Similar processing is also possible after the storage medium is reset by insertion/removal thereof or occurrence of an abnormal state.
When the storage medium 121 has not been initialized (S202: NO), the storage medium normal area control unit 209 performs an initialization processing for the storage medium 121 (S203). Furthermore, in the case where any of the storage medium information has been notified to the storage medium authentication area control unit 204 via the shared memory at least once, it is not necessary to set all the storage medium information for the shared memory. Only such storage medium access information as may be changed by re-initialization of the storage medium 121 is set for the shared memory (S1004).
With reference to
When transition to the secure mode is normally executed (S108: YES), the storage medium authentication area control unit 204 acquires, from the shared memory, the storage medium access information for accessing the storage medium 121 which has been set at S1004 (S1007). Then, the flow proceeds to S112, and data is sent and received to and from the storage medium 121 using the storage medium access information.
As described above, according to the sixth embodiment, when the mode is switched, instead of notifying the storage medium information to the storage medium authentication area control unit 204, it is sufficient to notify only the storage medium access information, in addition to the operation and advantages of the embodiments described above. Thereby, the processing by the storage medium authentication area control unit 204 can be speeded up.
According to the storage medium control system of the sixth embodiment, it is also possible to speed up the access to the authentication area 124 by simplifying the mutual authentication process by the storage medium authentication area processing unit 203 in the storage medium control apparatus 200 where the power thereto is repeatedly turned on and off by a power-saving mechanism or the like.
That is, the storage medium control system according to the sixth embodiment may perform the processings shown in
With reference to
When the confirmation is not received (S1118: NO), the mutual authentication process is performed again between the storage medium control apparatus 200 and the storage medium 121.
Then, the flow proceeds to S126 shown in
According to the first modification, it is possible to omit the second and subsequent mutual authentication processings. Thereby, the processing can be speeded up.
According to the storage medium control system of the sixth embodiment, it is also possible to speed up the access to the authentication area 124 by simplifying confirmation about whether or not the storage medium 121 has been initialized in the storage medium control apparatus 200 where the power thereto is repeatedly turned on and off by a power-saving mechanism or the like.
That is, the storage medium control system according to the sixth embodiment may perform the processings shown in
With reference to
According to the second modification, the storage medium normal area control unit 209 can always start processing when the power is on, and on the other hand, the storage medium authentication area control unit 204 can always start processing on the assumption that the power is on. Therefore, the processing can be speeded up by reduction of the power on/off judgment processing.
The storage medium control apparatuses according to the embodiments described above are applicable to various equipment. In a seventh embodiment, the storage medium control system is applied to a system for reproducing video and audio contents.
A storage medium video and audio reproduction system 450 according to the seventh embodiment is a system for reproducing video and audio contents stored in a storage medium 121, and it is provided with a storage medium control device 400, a data sending/receiving control device 210, an encoded data transfer device 440, and a video and audio data reproduction device 430.
Components similar to the components in the embodiments described above are given the same reference numerals and names. Therefore, a detailed description thereof is not repeated here.
A normal resource 212 of the data sending/receiving control device 210 is connected to the storage medium 121 in which the video and audio contents are stored.
The storage medium control device 400 is provided with a secure mode unit 201 and a normal mode unit 206.
The encoded data transfer device 440 is provided with an encoding processing unit 442 and a video and audio reproduction unit 441.
The encoding processing unit 442 is a processing unit which analyzes an encoding format of the video and audio contents received from a storage medium normal area control unit 209, decodes the video and audio contents, and sends the video and audio data to the video and audio reproduction unit 441 in a particular data unit.
The video and audio reproduction unit 441 is a processing unit which receives the video and audio data from the encoding processing unit 442 in the particular data unit and reproduces the data.
The video and audio data reproduction device 430 is provided with a video and audio output unit 431.
The video and audio output unit 431 is a processing unit which outputs the video and audio data reproduced by the video and audio reproduction unit 441, and it is specifically a display device, a speaker, and the like.
The processings performed by the storage medium video and audio reproduction system 450 are similar to those described in the embodiments described above.
The storage medium control apparatuses according to the embodiments described above are applicable to various equipment. In an eighth embodiment, the storage medium control system is applied to a system for recording video and audio contents.
A system for recording video and audio in a storage medium 550 according to the eighth embodiment is a system for recording video and audio contents stored in a storage medium 121, and it is provided with a storage medium control device 500, a data sending/receiving control device 210, an encoded data transfer device 540, and a video and audio data receiving device 530.
Components similar to the components in the embodiments described above are given the same reference numerals and names. Therefore, a detailed description thereof is not repeated here.
A normal resource 212 of the data sending/receiving control device 210 is connected to the storage medium 121 in which the video and audio contents are stored.
The storage medium control device 500 is provided with a secure mode unit 201 and a normal mode unit 206.
The video and audio data receiving device 530 is provided with a video and audio input unit 531. The video and audio input unit 531 is a processing unit which receives, from other equipment or broadcast waves, video and audio data to be recorded.
The encoded data transfer device 540 is provided with a video and audio recording unit 541 and an encoding processing unit 542.
The video and audio recording unit 541 is a processing unit which receives the video and audio data from the video and audio input unit 531 for every particular data unit.
The encoding processing unit 542 is a processing unit which encodes the video and audio data received by the video and audio recording unit 541 on the basis of a particular encoding format.
The processings performed by the system for recording the video and audio in the storage medium 550 are similar to those described in the embodiments described above.
Although only some exemplary embodiments of this invention have been described in detail above, those skilled in the art will readily appreciate that many modifications are possible in the exemplary embodiments without materially departing from the novel teachings and advantages of this invention. Accordingly, all such modifications are intended to be included within the scope of this invention.
The present invention is applicable to a system for reproducing or recording video and audio contents, and the like.
Number | Date | Country | Kind |
---|---|---|---|
2006-284373 | Oct 2006 | JP | national |
2007-129806 | May 2007 | JP | national |