US20150261941A1 - Recording device, and content-data playback system - Google Patents
Recording device, and content-data playback system Download PDFInfo
- Publication number
- US20150261941A1 US20150261941A1 US14/728,623 US201514728623A US2015261941A1 US 20150261941 A1 US20150261941 A1 US 20150261941A1 US 201514728623 A US201514728623 A US 201514728623A US 2015261941 A1 US2015261941 A1 US 2015261941A1
- Authority
- US
- United States
- Prior art keywords
- controller
- key
- key data
- data
- unique
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/101—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
- G06F21/1012—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to domains
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/101—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
- G06F21/1014—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to tokens
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00094—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
- G11B20/00115—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers wherein the record carrier stores a unique medium identifier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00246—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is obtained from a local device, e.g. device key initially stored by the player or by the recorder
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00253—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
- G11B20/00362—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier the key being obtained from a media key block [MKB]
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00485—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
- G11B20/00492—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00855—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a step of exchanging information with a remote server
- G11B20/00862—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a step of exchanging information with a remote server wherein the remote server can grant the permission to use a content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/101—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
- G06F21/1011—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to devices
-
- G06F2221/0706—
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B2220/00—Record carriers by type
- G11B2220/17—Card-like record carriers
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B2220/00—Record carriers by type
- G11B2220/60—Solid state media
- G11B2220/61—Solid state media wherein solid state memory is used for storing A/V content
Definitions
- the present invention relates to a content-data playback system enabling playback of content data while eliminating fraudulent use thereof, and a recording device used thereto.
- a key unique to a recording medium e.g., a medium-unique key is stored securely in a secret area in the recording medium, and is not externally-accessible at all. Therefore, even if, for example, an encrypted content key is solely copied fraudulently, a person who fraudulently copied that key cannot utilize content data without the medium-unique key.
- the controller possesses a controller key and unique identification information, and is configured to generate a controller-unique key unique for each controller in accordance with the controller key and the identification information.
- the memory unit stores an MKB generated by encrypting a medium key with a device key set that is a collection of a plurality of device keys, an encrypted device key set generated by encrypting the device key set with the controller-unique key, and a device-key-set index which uniquely identifies the device key set.
- the controller comprises a decryption unit which obtains a device key set by decrypting the encrypted device key set with the controller-unique key, an ID generating unit which generates a medium ID from the identification information and the device-key-set index, and an authentication unit which executes an authentication process with an exterior in accordance with the device key set, the medium ID, and the MKB.
- the controller possesses a controller key and unique identification information, and is configured to generate a controller-unique key unique for each controller in accordance with the controller key, the identification information, and secret information given to the controller.
- the memory unit stores an MKB generated by encrypting a medium key with a device key set that is a collection of a plurality of device keys, an encrypted device key set generated by encrypting the device key set with the controller-unique key, and a device-key-set index which uniquely identifies the device key set.
- the controller comprises a decryption unit which obtains a device key set by decrypting the encrypted device key set with the controller-unique key, an ID generating unit which generates a medium ID from the identification information and the device-key-set index, and an authentication unit which executes an authentication process with an exterior in accordance with the device key set, the medium ID, and the MKB.
- a content-data playback system comprises a recording device which stores content-data in an encrypted manner, and a host device capable of decrypting encrypted content data and of playback thereof, and the recording device comprises a memory unit which stores various data, and a controller which controls the memory unit.
- the controller possesses a controller key and unique identification information, and is configured to generate a controller-unique key unique for each controller in accordance with the controller key and the identification information.
- the memory unit stores an MKB generated by encrypting a medium key with a device key set that is a collection of a plurality of device keys, an encrypted device key set generated by encrypting the device key set with the controller-unique key, and a device-key-set index which uniquely identifies the device key set.
- the controller comprises a decryption unit which obtains a device key set by decrypting the encrypted device key set with the controller-unique key, an ID generating unit which generates a medium ID from the identification information and the device-key-set index, and a first authentication unit which executes an authentication process with the host device in accordance with the device key set, the medium ID, and the MKB.
- the host device comprises a recording unit which stores the device key set and the MKB, and a second authentication unit which executes an authentication process with the recording unit in accordance with the device key set and the MKB.
- FIG. 1 shows an overall configuration of a content-data playback system according to a first embodiment of the present invention
- FIG. 2 shows steps of writing-in various data in a memory 10 in the system shown in FIG. 1 ;
- FIG. 3 is for explaining an example configuration of an MKB generating unit 502 ;
- FIG. 4 is for explaining a modified example of the first embodiment.
- FIG. 5 is for explaining a characteristic part of a content-data playback system according to a second embodiment of the present invention.
- FIG. 1 shows a memory card 100 as an example recording device according to a first embodiment of the present invention, and a host device 200 which is capable of playback content data using data in the memory card 100 .
- the memory card 100 comprises a memory 10 , a controller 20 controlling the memory 10 , and an interface unit 30 .
- the memory card 100 comprises a secret recording unit 11 , and a normal recording unit 12 .
- the secret recording unit 11 becomes accessible when, for example, an authentication process between the memory card 100 and the host device 200 is completed.
- the secret recording unit 11 stores an MKB (Media Key Block), an encrypted device key Enc(Kcu:Kds), a device-key-set index Kds Index, and an encrypted title key Enc(Kmu:Kt) which is a first key.
- the MKB is generated by encrypting a medium key Km used as base key for encryption of content data with a device key set Kds.
- the device key set Kds is a collection of device keys Kd provided in the host device 200 as a secret key.
- the encrypted device key Enc(Kcu:Kds) is generated by encrypting the device key set Kds with a controller-unique key Kcu to be discussed later.
- the device-key-set index Kds Index is a reference numeral allocated to the device key set Kds, and uniquely identifies the device key sets Kds one by one.
- the controller 20 is provided with a controller key Kc and a serial number SN which is identification information unique for each controller 20 .
- the Controller-unique key Kcu unique to the controller 20 is generated based on the controller key Kc and the serial number SN.
- controller-unique key Kcu becomes different (controller-unique) data unique for each controller.
- the normal recording unit 12 is freely accessible without an authentication process, and stores encrypted content data Enc(Kt:Content) generated by encrypting content data Content with a title key Kt which is a first key.
- the controller 20 comprises a memory unit 21 , a secret calculation unit 22 , an encryption/decryption unit 23 , a first authentication unit 24 , and an ID generating unit 25 .
- the memory unit 21 stores the controller key Kc and the serial number SN both unique to the controller 20 .
- the secret calculation unit 22 generates the controller-unique key Kcu based on the controller key Kc and the serial number SN. As an example, an operation is executed using the controller key Kc and the serial number SN as input values to a one-way function, and an output value thereof is set to be the controller-unique key Kcu.
- the encryption/decryption unit 23 encrypts the device key set Kds with the controller-unique key Kcu, and decrypts the encrypted device key set Enc(Kcu:Kds) using the controller-unique key Kcu. In addition, the encryption/decryption unit 23 bears a part of decrypting, using the controller key Kc, the encrypted device key set Enc(Kc:Kds), which is generated by encrypting the device key set Kds with the controller key Kc.
- the first authentication unit 24 obtains the medium key Km by decrypting the MKB with the device key set Kds, generates a medium-unique key Kmu through a hash process in accordance with a medium ID, and executes authentication based on matching/mismatching of such key. That is, the first authentication unit 24 executes authentication with the exterior in accordance with the device key set Kds, the MKB, and the medium ID. Note that the medium-unique key Kmu is transmitted/received through the interface unit 30 , an interface unit 50 , and a secured channel.
- the ID generating unit 25 generates the medium ID based on the serial number SN, and the device-key-set index Kds Index.
- the host device 200 comprises a secret recording unit 41 , an encryption/decryption unit 42 , and a second authentication unit 43 .
- the secret recording unit 41 stores the foregoing device key set Kds, the device-key-set index Kds Index, and the MKB.
- the encryption/decryption unit 42 bears a part of encrypting the title key Kt with the medium-unique key Kmu to generate the encrypted title key Enc(Kmu:Kt), and of decrypting the encrypted device key set Enc(Kc:Kds) with the controller key Kc.
- the second authentication unit 43 obtains the medium key Km by decrypting the MKB with the device key set Kds, generates the medium-unique key Kmu through a hash process in accordance with the medium ID received from the ID generating unit 25 , and executes authentication based on matching/mismatching of such key.
- the controller-unique key Kcu is generated based on the controller key Kc of the controller 20 and the serial number SN thereof at the controller 20 in the memory card 100 . Only the controller manufacturing company knows the controller key Kc, and the algorithm of the secret calculation unit 22 , and such information is stored in a packaged chip in the controller 20 in an externally-unreadable manner.
- the controller-unique key Kcu generated based on the controller key Kc and the serial number SN is also used in only the controller 20 , and is not externally-readable.
- the device key set Kds is encrypted with the controller-unique key Kcu and stored in the memory 10 .
- Information for an authentication process using the MKB is encrypted with the controller-unique key Kcu unique to the controller 20 . Consequently, unless a controller manufacturing company externally leaks out the information on the controller key Kc, no misconduct happens in an authentication process using the MKB, so that content data can be rigidly protected against fraudulent use.
- the device key set Kds, and the device-key-set index Kds Index are supplied from a key management center 500 , and written in the memory 10 through the controller 20 .
- a key management center 500 a device having a predetermined communication function, and is in a writable condition of data from the key management center 500 .
- the memory 10 and the controller 20 configuring the memory card 100 are supplied from a memory manufacturing company 300 and a controller manufacturing company 400 , respectively.
- the controller manufacturing company 400 has information on the foregoing controller key Kc and on the serial number SN, and supplies the controller key Kc to the key management center 500 .
- the key management center 500 comprises a device key data base 501 , an MKB generating unit 502 , and an encryption unit 503 .
- the device key data base 501 stores a plurality of device keys Kd, and indexes Kd Index of the device keys Kd.
- the MKB generating unit 502 generates the MKB in accordance with the device key Kd and the index Kd Index supplied from the device key data base 501 .
- the encryption unit 503 receives the device key set Kds from the device key data base 501 , and generates the encrypted device key set Enc (Kc:Kds) by encrypting the device key set Kds with the content key Kc.
- the controller 20 obtains the device key set Kds by decrypting the encrypted device key set Enc (Kc:Kds) with the controller key Kc at an decryption unit 23 B which is a part of the encryption/decryption unit 23 .
- the secret calculation unit 22 generates the controller-unique key Kcu using the serial number SN and the controller key Kc.
- An encryption unit 23 A which is a part of the encryption/decryption unit 23 generates the encrypted device key set Enc (Kcu:Kds) by encrypting the device key set Kds with the controller-unique key Kcu, and stores such a key set in the secret recording unit 11 .
- the foregoing MKB and the device-key-set index Kds Index are also stored in the secret recording unit 11 .
- the device key set Kds is encrypted with the controller-unique key Kcu unique to the controller 20 , and stored in the memory 10 .
- the controller-unique key Kcu is generated based on the controller key Kc and the serial number SN at the secret calculation unit 22 in the controller 20 , so that the risk of leaking out such information is little, and thus the device key set of the MKB can be securely stored.
- the MKB generating unit 502 comprises an encryption unit 504 , a version generating unit 505 , a synthesis unit 506 , a key generating unit 507 , and a one-way function operation unit 508 .
- the encryption unit 504 encrypts device keys Kdi 1 , Kdi 2 , . . . Kdj 1 , Kdj 2 , . . . and the like supplied from the device key data base 501 using a medium key Km 1 or Km 0 .
- the device keys Kdi 1 , Kdi 2 . . . and the like are supplied to the host device 200 , and the device keys Kdj 1 , Kdj 2 . . . and the like are supplied to the memory card 100 .
- the version generating unit 505 generates version information on the MKB. It becomes possible to make more fraudulent devices invalid by distinguishing the newness of the MKB generated by the version information, and by using the newer MKB.
- the synthesis unit 506 has functions of synthesizing the encrypted medium key generated by the encryption unit 504 to generate the MKB, and also of adding the version information thereto.
- the key generating unit 507 generates the foregoing medium key Km 1 .
- the one-way function operation unit 508 inputs the foregoing medium key Km 1 to a one-way function in order to execute an operation, and generates the medium key Km 0 .
- the device key set Kds and others are encrypted and stored in the secret recording unit 11 of the memory card 100 , instead of this manner, for example, as shown in FIG. 4 , the device key set Kds, the device-key-set index Kds Index, the MKB, and the like may be once stored in the secret recording unit 41 of the host device 200 to which the memory card 100 is connected, and then those keys and the like may be encrypted and transmitted to the secret recording unit 11 of the memory 10 .
- the secret calculation unit 22 ′ generates the controller-unique key Kcu in accordance with inputting of secret information SEC supplied to the controller 20 in addition to the serial number SN and the controller key Kc.
- secret information SEC supplied to the controller 20 in addition to the serial number SN and the controller key Kc.
- data SNSEC is generated by combining the serial number SN with the secret information SEC, and an operation of the one-way function is executed using the SNSEC and the controller key Kc as input values.
- the controller-unique key Kcu is to be generated as an output value of such operation.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Mathematical Physics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
Abstract
A recording device configured to store content data in an encrypted manner, the recording device comprises a memory unit which stores various data, and a controller which controls the memory unit. The controller possesses a controller key and unique identification information, and is configured to generate a controller-unique key unique for each controller in accordance with the controller key and the identification information. The memory unit stores an MKB generated by encrypting a medium key with a device key set that is a collection of a plurality of device keys, an encrypted device key set generated by encrypting the device key set with the controller-unique key, and a device-key-set index which uniquely identifies the device key set.
Description
- This application is a continuation application of U.S. application Ser. No. 14/045,567, filed Oct. 3, 2013, which is a continuation application of U.S. application Ser. No. 12/717,458, filed Mar. 4, 2010, (now U.S. Pat. No. 8,578,177) which claims the benefit of priority from prior Japanese Patent Application No. 2009-99870, filed on Apr. 16, 2009, and prior Japanese Patent Application No. 2009-184176, filed on Aug. 7, 2009. The entire contents of the above-identified applications are incorporated herein by reference.
- 1. Field of the Invention
- The present invention relates to a content-data playback system enabling playback of content data while eliminating fraudulent use thereof, and a recording device used thereto.
- 2. Description of the Related Art
- Recently, content-distributing systems which distribute computerized content, such as books, newspapers, music, or motion pictures, to user terminals to allow users to view such content become widespread in accordance with the development of information societies.
- However, computerized content (hereinafter, simply called “content”) can be easily replicated, so that misconduct disregarding copyrights thereof is likely to happen. In general, from the standpoint of protecting content against such misconduct, content is recorded in an encrypted manner by an encryption key, and decrypted when reproduced. An example of such kind of content protection technologies is CPRM (Content Protection for Recordable Media). Moreover, there is proposed an encryption double-key scheme that uses two kinds of keys to doubly encrypt content (see, for example, JP2005-341156A). This kind of encryption double-key scheme is used in, for example, MQbic, (registered trademark). In encryption keys, a key unique to a recording medium, e.g., a medium-unique key is stored securely in a secret area in the recording medium, and is not externally-accessible at all. Therefore, even if, for example, an encrypted content key is solely copied fraudulently, a person who fraudulently copied that key cannot utilize content data without the medium-unique key.
- However, if such a medium-unique key is fraudulently read-out through some kind of scheme and is passed to a fraudulent card copying person, it results in cloned cards, made by copying of a legitimate card, floating around, so that fraudulent use of content data may happen.
- A recording device configured to store content-data in an encrypted manner according to a first aspect of the present invention comprises a memory unit which stores various data, and a controller which controls the memory unit. The controller possesses a controller key and unique identification information, and is configured to generate a controller-unique key unique for each controller in accordance with the controller key and the identification information. The memory unit stores an MKB generated by encrypting a medium key with a device key set that is a collection of a plurality of device keys, an encrypted device key set generated by encrypting the device key set with the controller-unique key, and a device-key-set index which uniquely identifies the device key set. The controller comprises a decryption unit which obtains a device key set by decrypting the encrypted device key set with the controller-unique key, an ID generating unit which generates a medium ID from the identification information and the device-key-set index, and an authentication unit which executes an authentication process with an exterior in accordance with the device key set, the medium ID, and the MKB.
- A recording device configured to store content-data in an encrypted manner according to a second aspect of the present invention comprises a memory unit which stores various data, and a controller which controls the memory unit. The controller possesses a controller key and unique identification information, and is configured to generate a controller-unique key unique for each controller in accordance with the controller key, the identification information, and secret information given to the controller. The memory unit stores an MKB generated by encrypting a medium key with a device key set that is a collection of a plurality of device keys, an encrypted device key set generated by encrypting the device key set with the controller-unique key, and a device-key-set index which uniquely identifies the device key set. The controller comprises a decryption unit which obtains a device key set by decrypting the encrypted device key set with the controller-unique key, an ID generating unit which generates a medium ID from the identification information and the device-key-set index, and an authentication unit which executes an authentication process with an exterior in accordance with the device key set, the medium ID, and the MKB.
- A content-data playback system according to a third aspect of the present invention comprises a recording device which stores content-data in an encrypted manner, and a host device capable of decrypting encrypted content data and of playback thereof, and the recording device comprises a memory unit which stores various data, and a controller which controls the memory unit. The controller possesses a controller key and unique identification information, and is configured to generate a controller-unique key unique for each controller in accordance with the controller key and the identification information. The memory unit stores an MKB generated by encrypting a medium key with a device key set that is a collection of a plurality of device keys, an encrypted device key set generated by encrypting the device key set with the controller-unique key, and a device-key-set index which uniquely identifies the device key set. The controller comprises a decryption unit which obtains a device key set by decrypting the encrypted device key set with the controller-unique key, an ID generating unit which generates a medium ID from the identification information and the device-key-set index, and a first authentication unit which executes an authentication process with the host device in accordance with the device key set, the medium ID, and the MKB. The host device comprises a recording unit which stores the device key set and the MKB, and a second authentication unit which executes an authentication process with the recording unit in accordance with the device key set and the MKB.
-
FIG. 1 shows an overall configuration of a content-data playback system according to a first embodiment of the present invention; -
FIG. 2 shows steps of writing-in various data in amemory 10 in the system shown inFIG. 1 ; -
FIG. 3 is for explaining an example configuration of an MKB generatingunit 502; -
FIG. 4 is for explaining a modified example of the first embodiment; and -
FIG. 5 is for explaining a characteristic part of a content-data playback system according to a second embodiment of the present invention. - Embodiments of the present invention will be explained in detail with reference to accompanying drawings.
-
FIG. 1 shows amemory card 100 as an example recording device according to a first embodiment of the present invention, and ahost device 200 which is capable of playback content data using data in thememory card 100. Thememory card 100 comprises amemory 10, acontroller 20 controlling thememory 10, and aninterface unit 30. - The
memory card 100 comprises asecret recording unit 11, and a normal recording unit 12. - The
secret recording unit 11 becomes accessible when, for example, an authentication process between thememory card 100 and thehost device 200 is completed. In this embodiment, thesecret recording unit 11 stores an MKB (Media Key Block), an encrypted device key Enc(Kcu:Kds), a device-key-set index Kds Index, and an encrypted title key Enc(Kmu:Kt) which is a first key. - The MKB is generated by encrypting a medium key Km used as base key for encryption of content data with a device key set Kds. The device key set Kds is a collection of device keys Kd provided in the
host device 200 as a secret key. Moreover, the encrypted device key Enc(Kcu:Kds) is generated by encrypting the device key set Kds with a controller-unique key Kcu to be discussed later. The device-key-set index Kds Index is a reference numeral allocated to the device key set Kds, and uniquely identifies the device key sets Kds one by one. - The
controller 20 is provided with a controller key Kc and a serial number SN which is identification information unique for eachcontroller 20. The Controller-unique key Kcu unique to thecontroller 20 is generated based on the controller key Kc and the serial number SN. - Data of the controller key Kc differs, for example, for each production lot. Moreover, the serial number SN is a different number for each chip. Consequently, the controller-unique key Kcu becomes different (controller-unique) data unique for each controller.
- In contrast, the normal recording unit 12 is freely accessible without an authentication process, and stores encrypted content data Enc(Kt:Content) generated by encrypting content data Content with a title key Kt which is a first key.
- The
controller 20 comprises amemory unit 21, asecret calculation unit 22, an encryption/decryption unit 23, afirst authentication unit 24, and anID generating unit 25. - The
memory unit 21 stores the controller key Kc and the serial number SN both unique to thecontroller 20. - The
secret calculation unit 22 generates the controller-unique key Kcu based on the controller key Kc and the serial number SN. As an example, an operation is executed using the controller key Kc and the serial number SN as input values to a one-way function, and an output value thereof is set to be the controller-unique key Kcu. - The encryption/
decryption unit 23 encrypts the device key set Kds with the controller-unique key Kcu, and decrypts the encrypted device key set Enc(Kcu:Kds) using the controller-unique key Kcu. In addition, the encryption/decryption unit 23 bears a part of decrypting, using the controller key Kc, the encrypted device key set Enc(Kc:Kds), which is generated by encrypting the device key set Kds with the controller key Kc. - The
first authentication unit 24 obtains the medium key Km by decrypting the MKB with the device key set Kds, generates a medium-unique key Kmu through a hash process in accordance with a medium ID, and executes authentication based on matching/mismatching of such key. That is, thefirst authentication unit 24 executes authentication with the exterior in accordance with the device key set Kds, the MKB, and the medium ID. Note that the medium-unique key Kmu is transmitted/received through theinterface unit 30, aninterface unit 50, and a secured channel. TheID generating unit 25 generates the medium ID based on the serial number SN, and the device-key-set index Kds Index. - In contrast, the
host device 200 comprises asecret recording unit 41, an encryption/decryption unit 42, and asecond authentication unit 43. Thesecret recording unit 41 stores the foregoing device key set Kds, the device-key-set index Kds Index, and the MKB. - The encryption/
decryption unit 42 bears a part of encrypting the title key Kt with the medium-unique key Kmu to generate the encrypted title key Enc(Kmu:Kt), and of decrypting the encrypted device key set Enc(Kc:Kds) with the controller key Kc. Thesecond authentication unit 43 obtains the medium key Km by decrypting the MKB with the device key set Kds, generates the medium-unique key Kmu through a hash process in accordance with the medium ID received from theID generating unit 25, and executes authentication based on matching/mismatching of such key. - As explained above, according to the content-data playback system of this embodiment, the controller-unique key Kcu is generated based on the controller key Kc of the
controller 20 and the serial number SN thereof at thecontroller 20 in thememory card 100. Only the controller manufacturing company knows the controller key Kc, and the algorithm of thesecret calculation unit 22, and such information is stored in a packaged chip in thecontroller 20 in an externally-unreadable manner. The controller-unique key Kcu generated based on the controller key Kc and the serial number SN is also used in only thecontroller 20, and is not externally-readable. - Moreover, the device key set Kds is encrypted with the controller-unique key Kcu and stored in the
memory 10. Information for an authentication process using the MKB is encrypted with the controller-unique key Kcu unique to thecontroller 20. Consequently, unless a controller manufacturing company externally leaks out the information on the controller key Kc, no misconduct happens in an authentication process using the MKB, so that content data can be rigidly protected against fraudulent use. - Next, writing-in procedures of data shown in
FIG. 1 in thememory 10 will be explained with reference toFIG. 2 . The device key set Kds, and the device-key-set index Kds Index are supplied from akey management center 500, and written in thememory 10 through thecontroller 20. Although it is not illustrated inFIG. 2 , let us suppose that thememory card 100 is connected to a device having a predetermined communication function, and is in a writable condition of data from thekey management center 500. - The
memory 10 and thecontroller 20 configuring thememory card 100 are supplied from a memory manufacturing company 300 and acontroller manufacturing company 400, respectively. In the embodiment, thecontroller manufacturing company 400 has information on the foregoing controller key Kc and on the serial number SN, and supplies the controller key Kc to thekey management center 500. - The
key management center 500 comprises a devicekey data base 501, anMKB generating unit 502, and anencryption unit 503. The devicekey data base 501 stores a plurality of device keys Kd, and indexes Kd Index of the device keys Kd. TheMKB generating unit 502 generates the MKB in accordance with the device key Kd and the index Kd Index supplied from the devicekey data base 501. Theencryption unit 503 receives the device key set Kds from the devicekey data base 501, and generates the encrypted device key set Enc (Kc:Kds) by encrypting the device key set Kds with the content key Kc. - The
controller 20 obtains the device key set Kds by decrypting the encrypted device key set Enc (Kc:Kds) with the controller key Kc at andecryption unit 23 B which is a part of the encryption/decryption unit 23. Moreover, thesecret calculation unit 22 generates the controller-unique key Kcu using the serial number SN and the controller key Kc. Anencryption unit 23 A, which is a part of the encryption/decryption unit 23 generates the encrypted device key set Enc (Kcu:Kds) by encrypting the device key set Kds with the controller-unique key Kcu, and stores such a key set in thesecret recording unit 11. The foregoing MKB and the device-key-set index Kds Index are also stored in thesecret recording unit 11. - In this manner, the device key set Kds is encrypted with the controller-unique key Kcu unique to the
controller 20, and stored in thememory 10. The controller-unique key Kcu is generated based on the controller key Kc and the serial number SN at thesecret calculation unit 22 in thecontroller 20, so that the risk of leaking out such information is little, and thus the device key set of the MKB can be securely stored. - Next, an example configuration of the
MKB generating unit 502 will be explained with reference toFIG. 3 . TheMKB generating unit 502 comprises anencryption unit 504, aversion generating unit 505, asynthesis unit 506, akey generating unit 507, and a one-wayfunction operation unit 508. - The
encryption unit 504 encrypts device keys Kdi1, Kdi2, . . . Kdj1, Kdj2, . . . and the like supplied from the devicekey data base 501 using a medium key Km1 or Km0. The device keys Kdi1, Kdi2 . . . and the like are supplied to thehost device 200, and the device keys Kdj1, Kdj2 . . . and the like are supplied to thememory card 100. - The
version generating unit 505 generates version information on the MKB. It becomes possible to make more fraudulent devices invalid by distinguishing the newness of the MKB generated by the version information, and by using the newer MKB. Thesynthesis unit 506 has functions of synthesizing the encrypted medium key generated by theencryption unit 504 to generate the MKB, and also of adding the version information thereto. - The
key generating unit 507 generates the foregoing medium key Km1. The one-wayfunction operation unit 508 inputs the foregoing medium key Km1 to a one-way function in order to execute an operation, and generates the medium key Km0. - In the foregoing explanation, although the device key set Kds and others are encrypted and stored in the
secret recording unit 11 of thememory card 100, instead of this manner, for example, as shown inFIG. 4 , the device key set Kds, the device-key-set index Kds Index, the MKB, and the like may be once stored in thesecret recording unit 41 of thehost device 200 to which thememory card 100 is connected, and then those keys and the like may be encrypted and transmitted to thesecret recording unit 11 of thememory 10. - Next, a second embodiment of the present invention will be explained with reference to
FIG. 5 . This embodiment differs from the first embodiment that thecontroller 20 has asecret calculation unit 22′ instead of thesecret calculation unit 22, but others are same as the first embodiment. Thesecret calculation unit 22′ generates the controller-unique key Kcu in accordance with inputting of secret information SEC supplied to thecontroller 20 in addition to the serial number SN and the controller key Kc. For example, data SNSEC is generated by combining the serial number SN with the secret information SEC, and an operation of the one-way function is executed using the SNSEC and the controller key Kc as input values. The controller-unique key Kcu is to be generated as an output value of such operation. - Although the embodiments of the present invention have been explained, the present invention is not limited to those embodiments, and can be changed and modified in various forms without departing from the scope and spirit of the present invention.
Claims (5)
1. (canceled)
2. A host apparatus configured to perform an authentication process, the host apparatus comprising:
an interface configured to send data to an external device;
a storage configured to store host private key data and index data, and a media key block; and
an authentication unit that obtains medium key data by decrypting the media key block using the host private key data, generates a medium unique key in accordance with an medium ID received from the external device, and executes authentication based on the medium key data.
3. The host device according to claim 2 , further comprising a first encryption unit that encrypts title key data with the medium unique key.
4. The host device according to claim 3 , further comprising a second encryption unit that encrypts content data using the title key.
5. The host apparatus according to claim 2 ,
wherein the external device includes a controller embedded with controller key data and value data;
the controller is configured to decrypt first encrypted private key data using the controller key data, the first encrypted private key data being generated by encrypting private key data;
the controller is configured to generate the private key data by decrypting the first encrypted private key data using
the controller key data; the controller is configured to generate second encrypted private key data by encrypting the private key data using the value data and the controller key data, and write the second encrypted private key data in the external device;
the private key data is encrypted by an organization using the controller key data;
the controller key data is embedded in the controller by a vendor that manufactures the controller, the vendor being different from the organization; and
the value data and the first encrypted private key data are inputted to the controller.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US14/728,623 US20150261941A1 (en) | 2009-04-16 | 2015-06-02 | Recording device, and content-data playback system |
Applications Claiming Priority (7)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2009-099870 | 2009-04-16 | ||
| JP2009099870 | 2009-04-16 | ||
| JP2009184176A JP2010268417A (en) | 2009-04-16 | 2009-08-07 | Recording apparatus and content data reproduction system |
| JP2009-184176 | 2009-08-07 | ||
| US12/717,458 US8578177B2 (en) | 2009-04-16 | 2010-03-04 | Recording device, and content-data playback system |
| US14/045,567 US9083512B2 (en) | 2009-04-16 | 2013-10-03 | Recording device, and content-data playback system |
| US14/728,623 US20150261941A1 (en) | 2009-04-16 | 2015-06-02 | Recording device, and content-data playback system |
Related Parent Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US14/045,567 Continuation US9083512B2 (en) | 2009-04-16 | 2013-10-03 | Recording device, and content-data playback system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| US20150261941A1 true US20150261941A1 (en) | 2015-09-17 |
Family
ID=42958355
Family Applications (3)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US12/717,458 Expired - Fee Related US8578177B2 (en) | 2009-04-16 | 2010-03-04 | Recording device, and content-data playback system |
| US14/045,567 Expired - Fee Related US9083512B2 (en) | 2009-04-16 | 2013-10-03 | Recording device, and content-data playback system |
| US14/728,623 Abandoned US20150261941A1 (en) | 2009-04-16 | 2015-06-02 | Recording device, and content-data playback system |
Family Applications Before (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US12/717,458 Expired - Fee Related US8578177B2 (en) | 2009-04-16 | 2010-03-04 | Recording device, and content-data playback system |
| US14/045,567 Expired - Fee Related US9083512B2 (en) | 2009-04-16 | 2013-10-03 | Recording device, and content-data playback system |
Country Status (3)
| Country | Link |
|---|---|
| US (3) | US8578177B2 (en) |
| JP (1) | JP2010268417A (en) |
| CN (2) | CN101866668B (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10397205B2 (en) * | 2014-12-24 | 2019-08-27 | International Business Machines Corporation | Recording data and using the recorded data |
| US20220090571A1 (en) * | 2016-03-02 | 2022-03-24 | Gentherm Incorporated | Systems And Methods For Supplying Power In A Hybrid Vehicle Using Capacitors, A Battery And One Or More DC/DC Converters |
Families Citing this family (56)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPWO2011111370A1 (en) * | 2010-03-11 | 2013-06-27 | パナソニック株式会社 | Recording system, playback system, key distribution server, recording device, recording medium device, playback device, recording method, and playback method |
| EP2579178A1 (en) * | 2010-06-04 | 2013-04-10 | Panasonic Corporation | Controller, control method, computer program, program recording medium, recording apparatus, and method of manufacturing recording apparatus |
| KR101305740B1 (en) * | 2010-09-10 | 2013-09-16 | 삼성전자주식회사 | Authentication method and apparatus for non volatile storage device |
| JP2012084071A (en) | 2010-10-14 | 2012-04-26 | Toshiba Corp | Digital content protection method, decryption method, reproducing device, memory medium and cryptographic device |
| JP5198539B2 (en) | 2010-11-05 | 2013-05-15 | 株式会社東芝 | Storage device, access device and program |
| JP5664236B2 (en) * | 2010-12-29 | 2015-02-04 | ソニー株式会社 | Data storage device, information processing device, information processing method, and program |
| JP5289476B2 (en) * | 2011-02-04 | 2013-09-11 | 株式会社東芝 | Communication device and key calculation device |
| KR101944468B1 (en) | 2011-04-04 | 2019-04-30 | 삼성전자주식회사 | Method, host device, storage and machine-readable storage medium for protecting contents |
| JP5050114B1 (en) | 2011-04-28 | 2012-10-17 | 株式会社東芝 | Information recording device |
| JP5159916B2 (en) * | 2011-04-28 | 2013-03-13 | 株式会社東芝 | host |
| US20140013453A1 (en) * | 2011-05-16 | 2014-01-09 | Yuichi Futa | Duplication judgment device and duplication management system |
| US9385871B2 (en) * | 2011-05-23 | 2016-07-05 | Samsung Electronics Co., Ltd | Method and apparatus for authenticating a non-volatile memory device |
| US8661527B2 (en) | 2011-08-31 | 2014-02-25 | Kabushiki Kaisha Toshiba | Authenticator, authenticatee and authentication method |
| KR20130050696A (en) | 2011-11-08 | 2013-05-16 | 삼성전자주식회사 | Memory system |
| JP5275432B2 (en) | 2011-11-11 | 2013-08-28 | 株式会社東芝 | Storage medium, host device, memory device, and system |
| KR101878682B1 (en) * | 2011-11-14 | 2018-07-18 | 삼성전자주식회사 | Method and storage medium for protecting contents |
| JP5204291B1 (en) * | 2011-12-02 | 2013-06-05 | 株式会社東芝 | Host device, device, system |
| JP5100884B1 (en) | 2011-12-02 | 2012-12-19 | 株式会社東芝 | Memory device |
| JP5204290B1 (en) | 2011-12-02 | 2013-06-05 | 株式会社東芝 | Host device, system, and device |
| JP5112555B1 (en) * | 2011-12-02 | 2013-01-09 | 株式会社東芝 | Memory card, storage media, and controller |
| WO2013105354A1 (en) * | 2012-01-12 | 2013-07-18 | ソニー株式会社 | Information storage device, information processing system, information processing method, and program |
| JP5275482B2 (en) | 2012-01-16 | 2013-08-28 | 株式会社東芝 | Storage medium, host device, memory device, and system |
| JP4991971B1 (en) * | 2012-03-08 | 2012-08-08 | 株式会社東芝 | Device to be authenticated and authentication method thereof |
| KR20130140948A (en) * | 2012-05-17 | 2013-12-26 | 삼성전자주식회사 | Apparatus and method for contents encryption and decryption based on storage device id |
| US8938616B2 (en) | 2012-06-14 | 2015-01-20 | Kabushiki Kaisha Toshiba | Authentication method |
| US8751814B2 (en) | 2012-06-14 | 2014-06-10 | Kabushiki Kaisha Toshiba | Device |
| US8949621B2 (en) | 2012-06-14 | 2015-02-03 | Kabushiki Kaisha Toshiba | Memory device authentication |
| US8627455B1 (en) * | 2012-06-14 | 2014-01-07 | Kabushiki Kaisha Toshiba | Manufacturing method of a memory device to be authenticated |
| US8726024B2 (en) | 2012-06-14 | 2014-05-13 | Kabushiki Kaisha Toshiba | Authentication method |
| US8650398B2 (en) | 2012-06-14 | 2014-02-11 | Kabushiki Kaisha Toshiba | Device authentication using restricted memory |
| US8995657B2 (en) | 2012-06-14 | 2015-03-31 | Kabushiki Kaisha Toshiba | Device and method for certifying one's own authenticity |
| US20130336478A1 (en) | 2012-06-15 | 2013-12-19 | Kabushiki Kaisha Toshiba | Authentication method |
| US20130336477A1 (en) * | 2012-06-15 | 2013-12-19 | Kabushiki Kaisha Toshiba | Medium |
| US8989374B2 (en) | 2012-06-15 | 2015-03-24 | Kabushiki Kaisha Toshiba | Cryptographic device for secure authentication |
| US8948400B2 (en) | 2012-06-15 | 2015-02-03 | Kabushiki Kaisha Toshiba | Host device |
| US20130336479A1 (en) | 2012-06-15 | 2013-12-19 | Kabushiki Kaisha Toshiba | Information recording device |
| US8693694B2 (en) | 2012-06-15 | 2014-04-08 | Kabushiki Kaisha Toshiba | Information recording device |
| US8898463B2 (en) | 2012-06-15 | 2014-11-25 | Kabushiki Kaisha Toshiba | Device |
| US8762717B2 (en) | 2012-06-15 | 2014-06-24 | Kabushiki Kaisha Toshiba | Authentication device |
| US8782440B2 (en) | 2012-08-15 | 2014-07-15 | International Business Machines Corporation | Extending the number of applications for accessing protected content in a media using media key blocks |
| JP5443575B2 (en) * | 2012-10-04 | 2014-03-19 | 株式会社東芝 | Memory card, host device, and system |
| JP5433757B2 (en) * | 2012-10-04 | 2014-03-05 | 株式会社東芝 | Memory device, host device, and system |
| US9201811B2 (en) | 2013-02-14 | 2015-12-01 | Kabushiki Kaisha Toshiba | Device and authentication method therefor |
| US8984294B2 (en) | 2013-02-15 | 2015-03-17 | Kabushiki Kaisha Toshiba | System of authenticating an individual memory device via reading data including prohibited data and readable data |
| US20140237245A1 (en) * | 2013-02-21 | 2014-08-21 | Kabushiki Kaisha Toshiba | Device and authentication method therefor |
| US20140245010A1 (en) * | 2013-02-25 | 2014-08-28 | Kabushiki Kaisha Toshiba | Device and authentication method therefor |
| US20140245024A1 (en) * | 2013-02-28 | 2014-08-28 | Kabushiki Kaisha Toshiba | Device and authentication method therefor |
| US20140281543A1 (en) * | 2013-03-12 | 2014-09-18 | Kabushiki Kaisha Toshiba | Host device configured for authentication with memory device |
| US20140281570A1 (en) * | 2013-03-13 | 2014-09-18 | Kabushiki Kaisha Toshiba | Method of performing an authentication process between data recording device and host device |
| US9256551B2 (en) * | 2013-08-09 | 2016-02-09 | Apple Inc. | Embedded encryption/secure memory management unit for peripheral interface controller |
| DE102013109902A1 (en) * | 2013-09-10 | 2015-03-12 | Deutsche Telekom Ag | Method and data storage system for protecting a solid state data storage against unauthorized access |
| WO2015075796A1 (en) | 2013-11-21 | 2015-05-28 | 株式会社 東芝 | Content management system, host device, and content key access method |
| CN105450392B (en) | 2015-12-04 | 2019-01-25 | 四川九洲电器集团有限责任公司 | A kind of method and device for determining key pair, data processing method |
| US10778654B2 (en) * | 2016-09-16 | 2020-09-15 | Arris Enterprises Llc | Method and apparatus for protecting confidential data in an open software stack |
| CN108123804B (en) * | 2017-12-29 | 2021-03-26 | 广州汇智通信技术有限公司 | Data decryption execution method, device and medium |
| CN108390756A (en) * | 2018-03-12 | 2018-08-10 | 临沂大学 | A kind of amoeba management mode operating system |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080028452A1 (en) * | 2006-07-26 | 2008-01-31 | Atp Electronics Taiwan, Inc. | Access control for secure portable storage device |
Family Cites Families (25)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH0697931A (en) | 1992-09-14 | 1994-04-08 | Fujitsu Ltd | Personal communication terminal registration control system |
| JP2000022680A (en) * | 1998-07-07 | 2000-01-21 | Open Loop:Kk | Digital contents distribution method and recording medium reproducibly recording contents |
| JP3389186B2 (en) * | 1999-04-27 | 2003-03-24 | 松下電器産業株式会社 | Semiconductor memory card and reading device |
| JP4011792B2 (en) | 1999-06-16 | 2007-11-21 | 株式会社東芝 | Recording method, reproducing method, recording apparatus, reproducing apparatus and recording medium |
| US7278016B1 (en) * | 1999-10-26 | 2007-10-02 | International Business Machines Corporation | Encryption/decryption of stored data using non-accessible, unique encryption key |
| US7013010B2 (en) * | 2000-12-29 | 2006-03-14 | Intel Corporation | Method and apparatus for optimally formatting media key blocks stored on media with high transfer latencies |
| US20020141577A1 (en) * | 2001-03-29 | 2002-10-03 | Ripley Michael S. | Method and system for providing bus encryption based on cryptographic key exchange |
| US8204226B2 (en) | 2002-10-18 | 2012-06-19 | Kabushiki Kaisha Toshiba | Encoding and recording apparatus, playback apparatus, and program |
| US7500101B2 (en) * | 2002-12-06 | 2009-03-03 | Sony Corporation | Recording/reproduction device, data processing device, and recording/reproduction system |
| JP2004208088A (en) * | 2002-12-26 | 2004-07-22 | Matsushita Electric Ind Co Ltd | Device key decryption device, device key encryption device, device key encryption / decryption device, device key decryption method, device key encryption method, device key encryption / decryption method, and program therefor |
| JP2005196926A (en) * | 2004-01-09 | 2005-07-21 | Toshiba Corp | Recording medium, recording medium writing apparatus, recording medium reading apparatus, recording medium writing method, and recording medium reading method |
| JP4686138B2 (en) | 2004-05-26 | 2011-05-18 | 株式会社東芝 | Storage medium conversion method, program and device |
| JP4081048B2 (en) * | 2004-06-18 | 2008-04-23 | 株式会社東芝 | Content protection method, apparatus and program |
| EP1612637A1 (en) * | 2004-06-29 | 2006-01-04 | Nagracard S.A. | Security module and method of personalisation of a security module |
| JP4634158B2 (en) * | 2005-01-20 | 2011-02-16 | 株式会社テクノ菱和 | Powder sieve device with static eliminator |
| JP4672437B2 (en) * | 2005-05-24 | 2011-04-20 | 株式会社東芝 | Content reproduction apparatus, content reproduction method, and content reproduction program |
| JP2007143022A (en) | 2005-11-22 | 2007-06-07 | Toshiba Corp | Content data distribution method and communication terminal used therefor |
| US20100153746A1 (en) | 2006-08-10 | 2010-06-17 | Matsushita Electric Industrial Co., Ltd. | Memory controller, secure memory card, and secure memory card system |
| US8423794B2 (en) * | 2006-12-28 | 2013-04-16 | Sandisk Technologies Inc. | Method and apparatus for upgrading a memory card that has security mechanisms for preventing copying of secure content and applications |
| KR20090000624A (en) * | 2007-03-09 | 2009-01-08 | 삼성전자주식회사 | Mutual authentication method with host device and system |
| JP4890309B2 (en) * | 2007-03-19 | 2012-03-07 | 株式会社リコー | Information processing apparatus and information protection method |
| JP2008269088A (en) * | 2007-04-17 | 2008-11-06 | Toshiba Corp | Program information providing system, program information providing method, and recording medium used for program information providing method |
| US8761402B2 (en) | 2007-09-28 | 2014-06-24 | Sandisk Technologies Inc. | System and methods for digital content distribution |
| JP5248153B2 (en) | 2008-03-14 | 2013-07-31 | 株式会社東芝 | Information processing apparatus, method, and program |
| US8571209B2 (en) * | 2009-01-19 | 2013-10-29 | International Business Machines | Recording keys in a broadcast-encryption-based system |
-
2009
- 2009-08-07 JP JP2009184176A patent/JP2010268417A/en active Pending
-
2010
- 2010-03-04 US US12/717,458 patent/US8578177B2/en not_active Expired - Fee Related
- 2010-03-10 CN CN2010101357126A patent/CN101866668B/en not_active Expired - Fee Related
- 2010-03-10 CN CN201210080820.7A patent/CN102623030B/en not_active Expired - Fee Related
-
2013
- 2013-10-03 US US14/045,567 patent/US9083512B2/en not_active Expired - Fee Related
-
2015
- 2015-06-02 US US14/728,623 patent/US20150261941A1/en not_active Abandoned
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080028452A1 (en) * | 2006-07-26 | 2008-01-31 | Atp Electronics Taiwan, Inc. | Access control for secure portable storage device |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10397205B2 (en) * | 2014-12-24 | 2019-08-27 | International Business Machines Corporation | Recording data and using the recorded data |
| US10397204B2 (en) | 2014-12-24 | 2019-08-27 | International Business Machines Corporation | Recording data and using the recorded data |
| US20220090571A1 (en) * | 2016-03-02 | 2022-03-24 | Gentherm Incorporated | Systems And Methods For Supplying Power In A Hybrid Vehicle Using Capacitors, A Battery And One Or More DC/DC Converters |
| US11852114B2 (en) * | 2016-03-02 | 2023-12-26 | Gentherm Incorporated | Systems and methods for supplying power in a hybrid vehicle using capacitors, a battery and one or more DC/DC converters |
Also Published As
| Publication number | Publication date |
|---|---|
| CN101866668A (en) | 2010-10-20 |
| US20140040634A1 (en) | 2014-02-06 |
| US20100268953A1 (en) | 2010-10-21 |
| JP2010268417A (en) | 2010-11-25 |
| CN102623030A (en) | 2012-08-01 |
| US8578177B2 (en) | 2013-11-05 |
| CN102623030B (en) | 2015-03-04 |
| CN101866668B (en) | 2012-05-23 |
| US9083512B2 (en) | 2015-07-14 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9083512B2 (en) | Recording device, and content-data playback system | |
| US7401231B2 (en) | Information recording/playback device and method | |
| US8312294B2 (en) | Information processing apparatus, authentication method, and storage medium | |
| US7443984B2 (en) | Information processing system and method for distributing encrypted message data | |
| KR100852305B1 (en) | Information processing system and method | |
| US20100268948A1 (en) | Recording device and content-data distribution system | |
| US9292714B2 (en) | Storage device and host device for protecting content and method thereof | |
| US20140075207A1 (en) | Apparatus, method, and computer program product for processing information | |
| US20090210724A1 (en) | Content management method and content management apparatus | |
| US9319389B2 (en) | Data recording device, and method of processing data recording device | |
| KR20050035140A (en) | Content processing apparatus and content protection program | |
| KR20030019317A (en) | Information processing system and method | |
| EP2702721B1 (en) | Data recording device, host device and method of processing data recording device | |
| US20100166189A1 (en) | Key Management Apparatus and Key Management Method | |
| US20140344582A1 (en) | Information recording device | |
| KR20010083940A (en) | Recovery of a master key from recorded published material | |
| CN102396179B (en) | Content data reproduction system and recording device | |
| JP3625355B2 (en) | External storage device, encryption unit device, decryption unit device, encryption system, decryption system, encryption method, and decryption method | |
| US8929547B2 (en) | Content data reproduction system and collection system of use history thereof | |
| CN101925886B (en) | Information updating device and integrated circuit thereof, information updating method, and recording device and integrated circuit thereof | |
| US20100058074A1 (en) | Right information encryption module, nonvolatile memory device, right information recording system, right information decryption module, right information reading system, and right information recording/reading system | |
| JPH11352881A (en) | Encryption apparatus and method, data decryption apparatus and method as well as data memory system | |
| JP5318069B2 (en) | Information processing device | |
| JP2006018335A (en) | Content storage preparation method, content storage method, content use method, terminal system, and storage medium connectable terminal device | |
| US20130336488A1 (en) | Host device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |