WO2003030447A2 - An encryption device, a decrypting device, a secret key generation device,a copyright protection system and a cipher communication device - Google Patents

An encryption device, a decrypting device, a secret key generation device,a copyright protection system and a cipher communication device Download PDF

Info

Publication number
WO2003030447A2
WO2003030447A2 PCT/JP2002/009245 JP0209245W WO03030447A2 WO 2003030447 A2 WO2003030447 A2 WO 2003030447A2 JP 0209245 W JP0209245 W JP 0209245W WO 03030447 A2 WO03030447 A2 WO 03030447A2
Authority
WO
WIPO (PCT)
Prior art keywords
secret key
unit
crl
decrypting
unit operable
Prior art date
Application number
PCT/JP2002/009245
Other languages
French (fr)
Other versions
WO2003030447A3 (en
Inventor
Motoji Ohmori
Makoto Tatebayashi
Takahiro Nagai
Hideshi Ishihara
Original Assignee
Matsushita Electric Industrial Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Matsushita Electric Industrial Co., Ltd. filed Critical Matsushita Electric Industrial Co., Ltd.
Priority to KR10-2004-7004596A priority Critical patent/KR20040039443A/en
Priority to US10/490,346 priority patent/US7542568B2/en
Priority to HU0401720A priority patent/HUP0401720A2/en
Priority to MXPA04002721A priority patent/MXPA04002721A/en
Priority to AU2002334409A priority patent/AU2002334409A1/en
Priority to EP02800230A priority patent/EP1430641A2/en
Publication of WO2003030447A2 publication Critical patent/WO2003030447A2/en
Publication of WO2003030447A3 publication Critical patent/WO2003030447A3/en
Priority to US12/431,148 priority patent/US20090208007A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/22Arrangements for preventing the taking of data from a data transmission channel without authorisation
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/603Digital right managament [DRM]

Definitions

  • the present invention relates to an encryption device and a decrypting device for protecting copyrights when transmitting digital productions via a recording medium or a transmission medium. More specifically, the present invention relates to a protection technique that is to protect against an attack enacted by a replacement of a Certificate Revocation List (CRL) specifying a revoked public key certificate.
  • CTL Certificate Revocation List
  • a computer authentication is conducted to avoid a copyright infringement by an authorized obtainment.
  • the first computer is to authenticate the second computer. In other words, the first computer makes sure that the second computer is a qualified computer to transmit.
  • a first computer sends a random number to a second computer, then the second computer encrypts the random number with its own secret key (i.e. digital signature) and replies it to the first computer. Finally, the first computer verifies the replied encrypted text (or the digital signature) using the second computer's public key.
  • its own secret key i.e. digital signature
  • the authentication using said public key encryption should be based on the condition that the public key itself is not revoked .
  • CA certificate authority
  • a public key certificate is obtained from the communication partner, and upon confirmed that the obtained public key certificate is not listed on the CRL, and then the above-mentioned authentication processing is executed so as to avoid transmitting a valuable digital production to an unauthorized communication partner.
  • a device such as a DVD drive device which plays back a DVD (digital Video/Versatile Disc), on which digital works (i.e. movies) are recorded, obtains the qualified CRL via a DVD and reads out the latest CRL from the DVD, and then authenticates the communication partner computer (a computer that operates an integrated playback processing circuit or playback software) with reference to the CRL.
  • the communication partner computer a computer that operates an integrated playback processing circuit or playback software
  • the first object of the present invention is, in the light of the above-mentioned problem, to provide an encryption device, a decrypting device, a secret key generation device, a copyright protection system and a cipher communication device that can defend from an attack enacted by a replacement of a CRL, and as a result, transmit a digital production safely.
  • the second object of the present invention is to provide a cipher communication device that can specify the latest CRL accurately when new CRL is obtained, and hold only the latest list in place of the old one.
  • an encryption device in an encryption deice that encrypts and outputs the digital production to a recording medium or a transmission medium, and comprises of a digital production memory unit operable to memorize a digital production, a first secret key memory unit operable to memorize a first secret key which is used for the encryption of the digital production, a second secret key memory unit operable to memorize a second secret key corresponding to a decrypting device that decrypts an encrypted digital production, a CRL memory unit operable to memorize a CRL which is an information list that specifies a revoked public key certificate, an attribute value calculating unit operable to calculate an attribute value dependent on details of a CRL based on the CRL memorized in the CRL memory unit, a transforming unit operable to transform the second secret key memorized in the second secret key memory unit with the attribute value calculated in the attribute value calculating unit, a first encryption unit operable to encrypt the first secret key memorized in the first secret key
  • the encrypted digital production, the encrypted first secret key which is used for encrypting the digital production, and the CRL are outputted from the encryption device.
  • the encrypted first secret key is not encrypted only with the second secret key which corresponds to the decrypting device, but also with the second secret key on which the details of the CRL has been reflected . Accordingly, when the CRL is replaced, the details of the CRL received by the decrypting device are different from the list reflected on the second secret key held in the decrypting device itself, that is, the second secret key is transformed.
  • the decrypting device which received the encrypted digital production, the encrypted first secret key and the CRL can not decrypt the encrypted first secret key to the original first secret key using the second secret key transformed as such. Therefore, the decrypting device can not decrypt the encrypted digital production right. As a result, the safe transmission of the digital production, having a defending function against an attack enacted by a replacement of the CRL, is realized.
  • the encryption device mentioned above may further include a confirmation data outputting unit operable to output a confirmation data which is to be a criterion for confirming whether the first secret key decrypted by the decrypting device is a right key or not.
  • the confirmation data outputting unit outputs a data obtained by encrypting the predetermined fixed-pattern data with the first secret key memorized in the first secret key memory unit as a confirmation data to the recording medium or the transmission medium
  • the confirmation data outputting unit outputs a data obtained by encrypting the first secret key memorized in the first secret key memory unit with the first secret key as a confirmation data to the recording medium or the transmission medium.
  • the decrypting device which received the encrypted digital production outputted from the encryption device, the encrypted first secret key, and the CRL can verify whether the CRL has been replaced or not, that is, whether the first secret key is decrypted rightly or not, so as to avoid useless processing of decrypting the digital production with a wrong key.
  • an encryption device is an encryption device that encrypts and outputs the digital production to a recording medium or a transmission medium, and comprises of a digital production memory unit operable to memorize the digital production, a first secret key memory unit operable to memorize a first secret key which is used for the encryption of the digital production, a second secret key memory unit operable to memorize a second secret key corresponding to a decrypting device that decrypts an encrypted digital production, a CRL memory unit operable to memorize a CRL which is an information list that specifies a revoked public key certificate, a first encryption unit operable to encrypt the first secret key memorized in the first secret key memory unit with the second secret key which is memorized in the second secret key memory unit, an attribute value calculating unit operable to calculate an attribute value dependent on details of a CRL based on the CRL memorized in the CRL memory unit, a transforming unit operable to transform the first secret key memorized in the first secret key memory unit with the attribute value calculated in the
  • the encrypted digital production, the encrypted first secret key which is used for encrypting the digital production, and the CRL are outputted from the encryption device.
  • the encrypted digital production is not encrypted only with the first secret key but also with the first secret key on which the details of the CRL has been reflected. Accordingly, when the CRL is replaced, the details of the CRL received by the decrypting device are different from the list reflected on the first secret key held in the decrypting device itself, that is, the first secret key is transformed.
  • the decrypting device which received the encrypted digital production, the encrypted first secret key and the CRL can not decrypt the encrypted digital production rightly using the first secret key transformed as such.
  • the safe transmission of the digital production having a defending function against an attack enacted by a replacement of the CRL, is realized.
  • the decrypting device which received the encrypted digital production outputted from the encryption device, the encrypted first secret key and the CRL to judge whether the CRL is replaced or not, that is, whether the secret key used for the encryption of the digital production is decrypted rightly or not by outputting a first secret key with an attachment of a confirmation data of a CRL, on which the first secret key has been reflected, from the encryption device, so as to avoid an useless processing of decrypting the digital production with a wrong key.
  • a cipher communication device is a cipher communication device that establishes a cipher communication with a partner device using a public key of the partner device, and comprises of a memory unit operable to memorize a CRL which is an information list for specifying a revoked public key certificate, an obtaining unit operable to obtain a new CRL, a storage unit operable to compare a size of an obtained CRL and the CRL memorized in the memory unit, and when the obtained CRL is larger in size, memorizes the obtained CRL to the memory unit and updates, and a communication unit operable to judge a key validity of a partner device with referring to the CRL memorized in the memory unit, and when the public key is not revoked, establishes a cipher communication with the partner device using the public key.
  • a CRL which is an information list for specifying a revoked public key certificate
  • an obtaining unit operable to obtain a new CRL
  • a storage unit operable to compare a
  • the above function of storage unit may change to compare the number of the certificate that is listed on the obtained CRL with the number of the certificate that is listed on the CRL memorized in the above memory unit, and when the certificate, listed on the obtained CRL, is large in number, memorizes it to the above memory unit and updates.
  • the cipher communication device can always hold a CRL that is large in size (or large in registration number), that is, a latest list.
  • the present invention realizes the digital production to be transmitted safely, against an attack of a replacement of the CRL.
  • the practical value for the present invention is extremely high in terms of delivering/distributing of the digital production via a transmission line such as Internet or a recording medium such as DVD, which is active in these days.
  • the present invention can be realized as a decrypting device which corresponds to the above encryption device or a secret key generation device, realized as a copyright protection system including the encryption device and the decrypting device, realized as an encryption method with steps of the characteristic unit that is comprised of the encryption device, the decrypting method or the cipher communication method, or realized as a program for having the computers to execute above steps.
  • the program according to the present invention can be marketed via a recoding medium such as a DVD or a transmission medium such as Internet.
  • Fig. 1 is a functional block diagram that shows an overall configuration of the recording copyright medium protection system la according to the first embodiment.
  • Fig. 2 is a diagram that shows a constructional example of the CRL.
  • Fig. 3 is a diagram that shows a constructional example of the public key certificate for the copyright protection licensor.
  • Fig. 4 is a diagram that shows a constructional example of the public key certificate for the manufacturer of the player.
  • Fig . 5 is a diagram that shows the sequence of the processing conducted between the IC card 210a in the decrypting device 200a and the descrambler 260.
  • Fig. 6 is a functional block diagram that shows an overall configuration of the recording medium copyright protection system lb according to the second embodiment.
  • Fig . 7 is a functional block diagram that shows an overall configuration of the recording medium copyright protection system lc according to the third embodiment.
  • Fig. 8 is a functional block diagram that shows an overall configuration of the recording medium copyright protection system Id according to the forth embodiment.
  • Fig. 9 is a functional block diagram that shows an overall configuration of the recording medium copyright protection system le according to the fifth embodiment.
  • Fig. 10 is a functional block diagram that shows an overall configuration of the recording medium copyright protection system according to the sixth embodiment.
  • Fig. 11 A is a flow chart that shows the verification processing conducted in the latest edition detecting processing unit 2391 in Fig .10.
  • Fig. 11 B is a flow chart that shows the latest edition list reading-out processing.
  • Fig . 12 is an external view of the HD-DVD player for which the decrypting devices 200a to 200f for the recording medium according to the first and the second embodiments are applied .
  • Fig . 13 is a functional block diagram that shows an overall configuration of the recording medium copyright protection system lg according to the seventh embodiment.
  • Fig. 14 is a functional block diagram that shows an overall configuration of the recording medium copyright protection system lh according to the eighth embodiment.
  • Fig . 15 is a functional block diagram that shows an overall configuration of the recording medium copyright protection system li according to the ninth embodiment.
  • Fig. 16 is a diagram that shows an example of the copyright protection module which includes LSI.
  • Fig. 17 is a block diagram that shows an overall configuration copyright protection system which establishes a cipher communication of the contents via small-scale home LAN.
  • Fig. 18 is a block diagram that shows a construction of the AV server lOOj and the plasma TV 200k of Fig. 17.
  • Fig . 1 is a functional block diagram that shows an overall configuration of the recording medium copyright protection system la according to the first embodiment.
  • a recording medium copyright protection system la is a system that records a content encrypted on a DVD 2a as a recording medium, or reads out the encrypted content from the DVD 2a and decrypts it.
  • the system includes an encryption device 100a that memorizes a content encrypted on the DVD 2a, a decrypting device 200a that reads out the encrypted content from the DVD 2a and decrypts it, and a terminal device 300 that is used by a Certificate Authority (CA) issuing a CRL, etc.
  • CA Certificate Authority
  • the encryption device 100a comprises two terminal devices, the terminal device 110a that the copyright protection licensor uses and a terminal device 160 that a content manufacturer uses.
  • the decrypting device 200a for example, is an HD-DVD player with the ability to reproduce a content of a picture level HD (1125i/750p), and includes an IC card 210a supplied by a copyright protection licensor, a descrambler 260 for the player manufacturer and a DVD-ROM drive (not shown in the Figure) which reads out the encrypted content from the DVD 2a.
  • the terminal device 110a that the copyright protection licensor uses is a computer device that provides information for the decrypting device 200a to have a copyright protection, that is, to provide a CRL, a content key for decrypting the content, and an encrypted content key ring . It comprises a CRL memory unit 111, a device key ring memory unit 112, a content key memory unit 113, a hashing function processing unit 114, an Ex-OR unit 115 and an Enc unit 116.
  • the CRL memory unit 111 accesses the terminal device 300 regularly via a communication network, i.e. Internet, etc, and updates/memorizes a latest CRL that the Certificate Authority (CA) provides.
  • the CRL as shown in Fig.2, includes a "file header” field, a "general” field and a “revoked list” field.
  • a "name” of the file O ⁇ D ⁇ .crl, a "size” of the file 79 KB, a "type” of the file revoked certificate list and a "update" of the file 2001/1507/12: 34 are included.
  • the device key ring memory unit 112 memorizes a device key ring KD_A (i.e.128 bit) peculiar to every IC card 210a supplied by the copyright protection licensor, in advance.
  • the content key memory unit 113 memorizes a content key Kc (i.e.128 bit) which is a secret key for encrypting a predetermined content, for example, music or movie.
  • Kc i.e.128 bit
  • the hashing function processing unit 114 is a processing unit that compresses a variable length of the CRL data memorized in the CRL memory unit 111, and converts it to a fixed length (i.e.128 bit) data (hashing value Hash) based on a hashing function. It converts based on a SHA-1 (Secure Hash Algorithm-l) or MD5, for example.
  • Ex-OR unit 115 an exclusive OR between the hashing value Hash calculated in the hashing function processing unit 114 and each device key KD_A memorized in the device key ring memory unit 112 is carried out (the each device key KD_A is transformed with the hashing value).
  • the Enc unit 116 outputs the content key Kc memorized in the content key memory unit 113 to the Ex-OR unit 115, that is, encrypts with an exclusive OR between the hashing value Hash and the each device key KD_A and generates an encryption content key ring .
  • the hashing function processing unit 114 and the Ex-OR unit 115 in the terminal device 110a transforms the device key KD_A using the CRL memorized in the CRL memory unit 111. This is because by encrypting the content key Kc with the transformed device key KD_A, it enables to make relationship between the encrypted content key outputted from the Enc unit 116 and the CRL. By doing so, it is defaceable from an attack enacted by replacing a CRL at the time of the decrypting processing in a decrypting device 200a as described later.
  • the terminal device 160 used by the content manufacturer, is a write device that records a CRL, which is passed from the terminal device 110a, or the encrypted content key ring, to the DVD 2a.
  • the terminal device 160 includes a content memory unit 161 and an Enc unit 162.
  • the content memory unit 161 memorizes a predetermined content, for example, music or movie content.
  • the Enc unit 162 encrypts a content memorized in the content memory unit 161 with a content key Kc passed from the terminal device 110a and generates an encrypted content.
  • the terminal device 110a reads out the CRL from the CRL memory unit 111.
  • the read out CRL is passed to the hashing function processing unit 114 and the terminal device 160.
  • the hashing function processing unit 114 calculates the hashing value Hash of the CRL and passes it to the Ex-OR unit 115.
  • the Ex-OR unit 115 reads out the device key KD_A, the content key Kc, etc one by one from the device key ring memory unit 112 and calculates the exclusive OR with the hashing value Hash right after the other, then outputs each exclusive OR value to the Enc unit 116.
  • the terminal device 110a reads out the content key Kc from the content key memory unit 113 and passes it to the Enc unit 116 and the terminal device 160.
  • the Enc unit 116 encrypts the passed content key Kc with each exclusive ORs outputted from the Ex-OR unit 115. More specifically, the Enc unit 116 encrypts the content key Kc with an exclusive OR between each value of the device key KD_A and the hashing value Hash. As a result, the Enc unit 116 generates a plurality of the encrypted content keys and passes them in a bunch to the terminal device 160.
  • the terminal device 160 writes the CRL passed from the terminal device 110a and the encrypted content key ring to the DVD 2a. And then the encrypted content generated by the Enc unit 162 writes to the DVD 2a .
  • the DVD 2a generated as such, is sold to users with the encrypted content in a condition that the encrypted content key in a bunch and the latest CRL in a bind.
  • an IC card 210a of the decrypting device 200a which decrypts such DVD 2a, is comprised of a module (TRM : Tamper Resistance Module) that is used for preventing the computer program from its deliberate change and protecting a copyright by eliminating an illegal descrambler which is listed on the CRL.
  • TRM Tamper Resistance Module
  • the IC card 210a includes a content key decrypting unit 220a which obtains a key for decrypting the encrypted content based on the CRL bound to the DVD 2a and an authentication processing unit 230a that checks whether a communication partner (descrambler 260) is revoked or not, and at the same time, sets a SAC (Secure Authentication Channel) between the descrambler 260 with bilateral authentication form.
  • a communication partner (descrambler 260) is revoked or not
  • SAC Secure Authentication Channel
  • the authentication processing unit 230a includes a public key memory unit for the certificate authority (CA) 231, a secret key for the IC card memory unit 232, a public key certificate memory unit for the IC card (the copyright licensor) 233, a random number generation unit 234, a CRL checking unit 235, an elliptic curve cryptography (ECC) processing unit 236, an authentication unit 237 and a buffer memory 238.
  • CA certificate authority
  • ECC elliptic curve cryptography
  • the public key memory unit for the certificate authority (CA) 231 memorizes a public key for authority PK_CA used for decrypting a digital signature of the Certificate Authority (CA) in advance.
  • the secret key memory unit for the IC card 232 memorizes a secret key SK_A for the IC card peculiar to an IC card used for own digital signature by the IC card 210a supplied by the copyright protection licensor in advance.
  • the public key certificate memory unit for the IC card 233 memorizes a public key certificate for an IC card Cert_A which is a document that the Certificate Authority (CA) proves that the public key PK_A is sure to belong to the IC card 210a.
  • the public key certificate for the IC card Cert_A includes an ID for the IC card 210a (copyright protection licensor), a public key for the IC card for a secret key for IC card SK_A, a CA's signature for the public key for the IC card PK_A, an expiry date (for the certificate), and thereof.
  • the random number generation unit 234 generates a random number (i.e. 128bit) as a time modulation value.
  • the CRL checking unit 235 checks whether the CRL includes the partner's (descrambler 260) ID or not.
  • the Elliptic Curve Cryptography (ECC) processing unit 236 executes an encryption processing (i.e. 256bit processing unit) based on the elliptical curve when the authentication of the SAC is set.
  • ECC Elliptic Curve Cryptography
  • the authentication unit 237 is a communication interface that communicates with the descrambler 260 via the SAC.
  • the buffer memory 238 holds temporary data such as a random number generated from the random number generation unit 234 or data that the Elliptic Curve Cryptography (ECC) processing unit 236 generates.
  • ECC Elliptic Curve Cryptography
  • the content key decrypting unit 220 includes a device key memory unit 221, a hashing function processing unit 222, an Ex-OR unit 223 and a Dec processing unit 224.
  • the device key memory unit 221 memorizes a peculiar device key KD_A (it is a secret key, i.e.AES128bit key) into the IC card 210a.
  • the hashing function processing unit 222 is the same construction with the hashing function processing unit 114 of the terminal device 110a and calculates a hashing value Hash (i.e. 128bit) of the CRL bound to the DVD 2a.
  • the Ex-OR unit 223 calculates an exclusive OR between a hashing value Hash calculated in the hashing function processing unit 222 and each device key KD_A memorized in the device key memory unit 221 (transforms the each device key KD_A with the hashing value).
  • the Dec processing unit 224 generates a content key Kc by decrypting its own encrypted content key memorized in a predetermined place inside the encrypted content key ring bound to DVD 2a with an exclusive OR value between the device key KD__A and the hashing value Hash.
  • the descrambler 260 is configured with a module used for preventing an illegal tamper of the computer program, which includes an authentication processing unit 270 for checking whether a communication partner (IC card 210a) is revoked or not with the CRL, and for setting a SAC between the IC card 210a in a bilateral authentication form, and a Dec processing unit 280 for decrypting an encrypted content read out from the DVD 2a with a content key passed from the IC card 210a and for obtaining a content.
  • a module used for preventing an illegal tamper of the computer program which includes an authentication processing unit 270 for checking whether a communication partner (IC card 210a) is revoked or not with the CRL, and for setting a SAC between the IC card 210a in a bilateral authentication form, and a Dec processing unit 280 for decrypting an encrypted content read out from the DVD 2a with a content key passed from the IC card 210a and for obtaining a content.
  • the authentication processing unit 270 comprises a public key memory unit for the certificate authority (CA) 271, a secret key memory unit for the descrambler 272, a public key certificate memory unit for the descrambler (player manufacturer) 273, an random number generation unit 274, a CRL checking unit 275, an Elliptic Curve Cryptography (ECC) processing unit 276, an authentication unit 277 and a buffer memory 278.
  • CA certificate authority
  • ECC Elliptic Curve Cryptography
  • the public key memory unit for the certificate authority (CA) 271 memorizes the public key for the certificate authority (CA) of the certificate authority (CA) PK_CA in advance.
  • the secret key memory unit for the descrambler 272 is supplied by the HD-DVD player 200 manufacturer and memorizes a peculiar secret key for the descrambler SK_i which is used for an own signature for the descrambler 260.
  • the public key certificate memory unit for the descrambler is supplied by the HD-DVD player 200 manufacturer and memorizes a peculiar secret key for the descrambler SK_i which is used for an own signature for the descrambler 260.
  • the certificate descrambler Cert_i as shown in Fig.4, includes an ID (serial numbers for a certificate) of the descrambler 260 (the player manufacturer), a public key for the descrambler PK_i for a secret key for the descrambler SK_i, a digital signature of the certificate authority (CA) for the secret key for the descrambler PK_i and an expiry date (for the certificate).
  • the random number generation unit 274 generates a random number (i.e. l28bit) as a time modulation.
  • the CRL checking unit 275 checks whether a partner (IC card
  • ID number is included in the CRL or not.
  • the Elliptical Curve Cryptography (ECC) processing unit 276 executes an encryption processing (i.e. 256bit processing unit) based on the elliptical curve when an authentication of the SAC is set.
  • ECC Elliptical Curve Cryptography
  • the authentication unit 277 is a communication interface which communicates with the IC card 210a via the SAC.
  • the buffer memory 278 holds temporary data such as a random number generated from the random number generation unit 234 or data that the Elliptical Curve Cryptography (ECC) processing unit 276 generated.
  • ECC Elliptical Curve Cryptography
  • FIG. 5 illustrates a SAC setting between the IC card 210a and the descrambler 260, and a sequence of a decrypting for the encrypted content recorded on the DVD 2a.
  • Fig . 5 is a diagram that shows the sequence of the processing conducted between the IC card 210a in the decrypting device 200a and the descrambler 260.
  • the random number generation unit 274 of the descrambler 260 When a user instructs to playback the content of the DVD 2a, the random number generation unit 274 of the descrambler 260 generates a first random number y (i.e. l28bit) and memorizes it to the buffer memory 278 (SI).
  • the authentication unit 277 of the descrambler 260 reads out the first random number y memorized in the buffer memory 278 and a public key certificate for the descrambler Cert_i memorized in the public key certificate memory unit for the descrambler 273, and then sends them to the IC card 210a (S2).
  • the authentication unit 237 in the IC card 210a stores the first random number y received from the descrambler 260 and the public key certificate for the descrambler Cert_i in the buffer memory 238.
  • the CRL checking unit 235 checks whether the descrambler 260 is revoked or not based on the CRL passed from the HD-DVD player 200a (S3). More specifically, the checking is conducted based on the fact that the ID for the descrambler 260 is listed on the CRL or not.
  • the authentication unit 237 verifies the public key certificate Cert_i with the public key of the certificate authority (CA) PK_CA (S4).
  • the digital signature of the public key authority included in the public key certificate for the descrambler Cert_i is decrypted with the public key of the certificate authority (CA) PK_CA, and a verification is conducted whether the public key certificate for the descrambler Cert_i is sure to belong to the descrambler 260.
  • the random number generation unit 234 After the verification, the random number generation unit 234 generates the first random number x (i.e. 128bit) and stores it to the buffer memory unit 238 (S5).
  • the authentication unit 237 reads out the first random number x memorized in the buffer memory 238 and the public key certificate for the IC card Cert_A memorized in the public key certificate memory unit for the IC card 233, and send them to the descramble 260 (S6).
  • the CRL checking unit 275 checks whether the IC card 210a is revoked or not based on the CRL passed from a HD-DVD player 200a (S7). In other words, the checking is made by judging whether an ID of the IC card 210a is listed on the CRL or not.
  • the authentication unit 277 verifies the public key certificate for the IC card Cert_A with the public key of the certificate authority (CA) PK_CA (S8).
  • the authentication unit 277 decrypts the digital signature of the public key authority included in the key public certificate for the IC card Cert_A and the verification is conducted whether the public key certificate for the IC card Cert__A is sure to belong to the IC card 210a.
  • the random number generation unit 274 generates the second random number y' (i.e. 128bit), and memorizes it to the buffer memory 278 (S9).
  • the Elliptical Curve Cryptography (ECC) processing unit 276 multiplies the second random number y' and a base point G (constants) on an elliptic curve, thus, generates an y'G. Then the y'G is memorized in the buffer memory 278 (S10).
  • This digital signature is put by signing the secret key SKJ into a bit connection of the multiplication of y'G and the first random x.
  • " stands for a bit connection, which is, indicating the y'G and the random number x are connected to the digit direction to be resulted to as 256 bit (i .e. y'G to be upper 128 bit, random x to be lower 128 bit).
  • the authentication unit 277 sends the multiplication of the y'G and the digital signature SI which corresponds to the multiplication of the y'G to the IC card 210a (S12).
  • the authentication unit 237 in the IC card 210 stores a y'G and a digital signature SI which corresponds to y'G to the buffer memory 238, and after that, verifies whether the digital signature SI is the digital signature of the descrambler 260 that corresponds to the y'G
  • the verification is conducted by decrypting the digital signature S I with the public key for the descrambler PK_J, and separates a bit connection between the y'G and the random number x. This enables to confirm the communication partner (descrambler 260) is not an illegal partner.
  • the random number generation unit 234 in the IC card 210a generates a second random number x' and memorizes it to the buffer memory unit 238 (S14).
  • the Elliptical Curve Cryptography (ECC) processing unit 236 multiplies the second random number x' and a base point G (constants) on an elliptic curve and thus generates a x'G. Then the x'G is memorized in the buffer memory 238 (S15).
  • This digital signature is put by signing the secret key SK_A into a bit connection of the multiplication of x'G and the first random number y.
  • the authentication unit 237 sends the multiplication of the x'G and the digital signature SO to the descrambler 260 (S17).
  • the authentication unit 277 in the descrambler 260 memorizes the multiplication of the x'G received from the IC card 210a and the digital signature SO to the buffer memory 278. After that, the authentication unit 277 verifies whether the digital signature SO is the digital signature of the descrambler 260 which corresponds to the x'G
  • the content key decrypting unit 220a in the IC card 210a executes a content key decrypting processing.
  • the hashing function processing unit 222 calculates a hashing value Hash of the CRL passed from the HD-DVD player 200a in the first place (S22) .
  • the Ex-OR unit 223 carries out an exclusive OR between own device key KD__A of the IC card 210a memorized in the public key memory unit for certificate authority (CA) 231 and the hashing value Hash (S23).
  • the Dec processing unit 224 decrypts the encrypted content key with the derived exclusive OR value, obtains the content key Kc (S24) and passes the content key Kc to the authentication unit 237, then the content key decrypting processing is finished. After the content key Kc is given, the authentication unit 237 encrypts it with the session key K (S25) and sends it to the descrambler 260 via the SAC (S26). This enables to prevent the content key Kc from wiretapping.
  • the authentication unit 277 in the descrambler 260 decrypts the encrypted content key received from the IC card 210a with the session key K', obtains the content key Kc (S27) and passes the content key Kc to the Dec processing unit 280.
  • the descrambler 260 decrypts the encrypted content with the content key Kc received from the authentication unit 277 and obtains the content (S28). This enables the content to be decrypted with protecting the copyright.
  • the SAC is set as same with the above mentioned case and can go on to the cipher communication step (S21) using the session key.
  • the CRL and the encrypted content key ring encrypted with information associated with the hashing value Hash of the CRL are to be bounded to the DVD 2a. For this reason, when the case that the CRL is replaced, the hashing value Hash of the replaced CRL and the hashing value Hash of the CRL bound to the DVD 2a do not match in its value. As a result, it is impossible to obtain a qualified content key Kc by decrypting an encrypted content using the hashing value Hash of the replaced CRL. For obtaining the qualified content key Kc for decrypting the encrypted content, it is necessary to pass the CRL bound to the DVD 2a in return.
  • FIG. 6 is an external view of an arrangement of the copyright protection system lb for recording medium according to the second embodiment. Now that the components of the recording medium copyright protection system lb are put the same number corresponding to those the recording medium copyright protection system la of the first embodiment, the explanation is to be omitted except the different part of the recording medium copyright protection system la.
  • the Ex-OR unit 115 carries out the exclusive OR between the hashing value Hash of the CRL outputted from the hashing function processing unit 114 and the each device key.
  • the Enc unit 116 encrypts a content key Kc with the exclusive OR value and generates the encrypted content key ring.
  • the terminal device 110b in the encryption device 100b according to the second embodiment the Enc unit 117 encrypts the content key Kc only with each device key memorized in the device key ring memory unit 112 and generates an encrypted content key ring encrypted only with each device key.
  • the terminal device 110a in the encryption device 100a according to the first embodiment passes the content key Kc, without any change, to the terminal device 160. So, the terminal device 160 encrypts a content with the content key Kc and generates the encrypted content.
  • the terminal device 110b in the encryption device 100b according to the second embodiment carries out the exclusive OR between the hashing value Hash of the CRL outputted from the hashing processing unit 114 and the content key Kc in the Ex-OR unit 118 and passes it to the terminal device 160. As a result, the terminal device 160 is received the exclusive OR value encrypts the content with the exclusive OR value and generates the encrypted content in the Enc unit 162.
  • the content key decrypting unit 220a in the decrypting device 200a calculates the exclusive OR between the self device key KD_A memorized in the device key memory unit 221 in the Ex-OR unit 223 and the hashing value Hash of the CRL.
  • the Dec processing unit 224 decrypts the encrypted content on which the hashing value Hash is associated, with the exclusive OR value and obtains the content key Kc.
  • the content key decrypting unit 220b in the decrypting device 200b decrypts the encrypted content key only with the self device key memorized in the device key memory unit 221 in the Dec processing unit 225 because the hashing value Hash isn't associated with the encrypted content key bound to the DVD2b and obtains the content key Kc. Since the encrypted content bound to the DVD2b is associated with the hashing value Hash, the Ex-OR unit 226 carries out the exclusive OR between the content key Kc obtained from the Dec processing unit 225 and the hashing value Hash of the CRL calculated in the hashing function processing unit 222 and passes the obtained exclusive OR value to the authentication unit 237 in the authentication processing unit 230a.
  • the exclusive OR value between the content key Kc and the hashing value Hash is passed from the authentication unit 237 to the Dec processing unit 280 via the SAC and the authentication unit 277 in the descramble 260.
  • the Dec processing unit 280 obtains a content by decrypting the encrypted content associated with the hashing value Hash which is recorded on the DVD2b with the exclusive OR between the content key and the hashing value Hash.
  • the recording medium copyright protection system lb according to the second embodiment, it is necessary to pass the CRL bound to the DVD 2a to obtain a key for decrypting the content in return, as is the same case with the first embodiment. As a result, it is possible to intensify the copyright protection by eliminating the decrypting device 200b which conducts an illegal operation such as a replacement of the CRL.
  • Fig. 7 is a functional block diagram that shows an overall configuration of the recording medium copyright protection system lc according to the third embodiment.
  • functional parts corresponding to the recording medium copyright protection system la according to the first embodiment are not shown, and only the part specific to the recording medium copyright protection system lc is shown .
  • the IC card 210a in the decrypting device 200c simply passes the obtained content key Kc to the descrambler 260b. In this way, it is impossible for the IC card 210a itself to know whether the obtained key is a qualified key that can decrypt the encrypted content, normally or not. Accordingly, it is desirable to pre-check that the content key Kc has the right value or not before passing the obtained content key Kc to the descrambler 260.
  • the copyright protection system for a recording medium lc is a system that having a key checking function.
  • the terminal device 110c used by the copyright protection licensor of the encryption device 100c, has a fixed-pattern memory unit 119 besides the componentry of the terminal device 110a.
  • the fixed-pattern memory unit 119 memorizes a predetermined fixed-pattern plaintext (i.e. fixed-pattern plaintext indicated in hex "0123456789ABCDEF") which is encrypted with the content key Kc in advance.
  • This fixed-pattern memorized in the fixed-pattern memory unit 119 is bound to the DVD2c via the terminal device 160.
  • the content key decrypting unit 220c set in the IC card 210c in the decrypting device 200c includes a Dec processing unit 227 and a content decrypting key checking unit 228 besides the componentry of the content key decrypting unit 220a.
  • the Dec processing unit 227 decrypts the encrypted data of the fixed-pattern plaintext bound to the DVD 2a with the content key Kc decrypted by the Dec processing unit 224.
  • the content decrypting key checking unit 228 pre-holds the above-mentioned fixed-pattern plaintext ⁇ 0123456789ABCDEF' and checks whether the decrypting key Kc has a right value or not by checking the pre-hold fixed-pattern plaintext and the fixed-pattern plaintext decrypted by the Dec processing unit 227 are the same value or not.
  • the recording medium copyright protection system lc it is possible to check whether the content key Kc has the right value or not within the IC card 210c in advance. And it is avoidable to execute the decrypting processing with a wrong content key Kc in the descrambler 260.
  • the key checking function is applied to the recording medium copyright protection system la according to the first embodiment, the key checking function may also be applicable to the recording medium copyright protection system lb according to the second embodiment.
  • the fixed-pattern memory unit 119 memorizes an encrypted fixed-pattern plaintext ⁇ 0123456789ABCDEF' with the exclusive OR between the content key Kc and the hashing value Hash as a fixed-pattern in advance, and records it on the DVD2c.
  • the Dec processing unit 227 in the content key decrypting unit 220c outputs the Dec processing unit 224, that is, outputs the Ex-OR unit 226 (refer to Fig.6) in place of the content key KC, that is, decrypts the encrypted data of the fixed-pattern plaintext bound to DVD 2a with the exclusive OR between the content key Kc and the hashing value Hash.
  • the content decrypting key checking unit 228 is able to check whether the key for decrypting the decrypted content is a qualified key or not, in other words, the exclusive OR between the content key Kc and the hashing value Hash is a right value or not by checking whether the pre-holding fixed-pattern plaintext 0123456789ABCDEF' and the fixed-pattern plaintext decrypted in the Dec 227 are the same value or not.
  • Fig.8 is a functional block diagram that shows an overall configuration of the recording medium copyright protection system Id according to the forth embodiment.
  • the functional parts corresponding to the recording medium copyright protection system la according to the first embodiment are not shown and only the part specific to the recording medium copyright protection system Id is shown.
  • the recording medium copyright protection system Id is a system that has a key checking function as same with the recording medium copyright protection system lc.
  • the terminal device llOd in the encryption device lOOd includes an Enc unit 131 besides the componentry of the terminal device 110a.
  • the Enc unit 131 generates a content key reference data encrypted with the content key Kc read out from the content key memory unit 113.
  • the content key reference data is bound to the DVD2d.
  • the content key decrypting unit 220d set in the IC card 210d in the decrypting device 200d includes an Enc unit 241 and a content key checking unit 242 besides componentry of the content key decrypting unit 220a.
  • the Enc unit 24 encrypts the content key decrypted in the Dec processing unit 224 with the content key Kc and generates the content key reference data.
  • the content key checking unit 242 matches up the content key reference data generated in the Enc unit 241 with the content key reference data bound to the DVD2d and checks if both data have the same value by checking whether the content key Kc decrypted by the Dec processing unit 224 is the qualified key or not, that is, the key can be used for decrypting the encrypted content or not.
  • the recording medium copyright protection system Id it is possible to check whether the content key Kc has the right value or not within the IC card 210d in advance as same with the recording medium copyright protection system ic. And it is avoidable to execute the decrypting processing with a wrong content key Kc in the descrambler 260.
  • the key checking function is applied to the recording medium copyright protection system la according to the first embodiment, the key checking function may also be applicable to the recording medium copyright protection system lb according to the second embodiment.
  • the Enc unit 131 since the content is encrypted with the exclusive OR between the content key Kc and the hashing value Hash of the CRL, the Enc unit 131 outputs the content key memory unit 113, that is, outputs the Ex-OR unit 118 in place of the content key KC, that is, decrypts the encrypted data of the fixed-pattern plaintext bound to DVD 2a with the exclusive OR between the content key Kc and the hashing value Hash and records it as a content key reference data on the DVD2c.
  • the Enc unit 241 in the content key decrypting unit 220d outputs the Dec processing unit 224, that is, outputs the Ex-OR unit 226 (refer to Fig.6) in place of the content key KC, that is, encrypts the exclusive OR value between the content key Kc and the hashing value Hash with the exclusive OR value.
  • the content key checking unit 242 checks whether the key generated in the Ex-OR unit 226 is the qualified key for decrypting the encrypted content or not by comparing the content key reference data generated in the Enc unit 241 and the content key reference data bound to the DVD2d.
  • Fig.9 is a functional block diagram that shows an overall configuration of the recording medium copyright protection system le according to the fifth embodiment.
  • the functional parts corresponding to the recording medium copyright protection system la according to the first embodiment are not shown, and only the part specific to the recording medium copyright protection system le is shown.
  • the recording medium copyright protection system le is a system that has a key checking function as same with the recording medium copyright protection systems lc and Id, and its component is as same with the encryption device lOOd according to the forth embodiment.
  • the content key reference data generated from the Enc unit 131 is bound to the DVD2d.
  • the Dec processing unit 243 is encrypted in the Enc unit 131 as stated above and decrypts the content key reference data bound to DVD2d with the content key Kc decrypted in the Dec processing unit 224.
  • the content key checking unit 244 which matches up the content key Kc decrypted in the Dec processing unit 224 with the content key Kc decrypted in the Dec processing unit 243, and checks if both keys have the same value by checking the content key Kc decrypted by the Dec processing unit 224 is the qualified key or not, that is, whether the key can be used for decrypting the encrypted content or not.
  • the key checking function is applied to the recording medium copyright protection system la according to the first embodiment, the key checking function may also be applicable to the recording medium copyright protection system lb according to the second embodiment.
  • the Enc unit 131 outputs the content key memory unit 113, that is, outputs the Ex-OR unit 118 in place of the content key KC, that is, decrypts the encrypted data of the fixed-pattern plaintext bound to DVD 2a with the exclusive OR of the content key Kc and the hashing value
  • Hash and records it as a content key reference data to the DVD2c.
  • the Dec processing unit 243 in the content key decrypting unit 220e outputs the content key decrypting data read from the DVD2c to the Dec processing unit 224, that is, outputs the Ex-OR unit 226 (refer to Fig.6) in place of the content key KC, that is, decrypts with the exclusive OR value between the content key Kc and the hashing value Hash.
  • the content key checking unit 244 checks whether the key generated in the Ex-OR unit 226 is the qualified key that can decrypt an encrypted key or not, that is, compares the exclusive OR value between the content key Kc and the hashing value Hash with the key decrypted by the Dec processing unit 243 and checks the two values match or not .
  • Fig .10 is a functional block diagram that shows an overall configuration of the recording medium copyright protection system according to the sixth embodiment.
  • the CRL checking unit 235 checks the CRL bound to the DVD and judges whether the communication partner (descrambler 260) is revoked or not. With this check, however, it is impossible to revoke the descrambler 260 when the public key certificate of the communication partner (descrambler 260) is revoked after updating the CRL if the time of the production of the DVD is well before, that is, the CRL bound to the DVD is old. For this reason, it is necessary to make judgment whether the communication partner (descrambler 260) is revoked or not using a CRL as the latest possible.
  • the recording medium copyright protection system If according to the sixth embodiment has a latest edition CRL memory processing unit 239 besides the componentry of the authentication processing unit 230a in the authentication processing unit 230b in the IC card 210f in the decrypting device 200f.
  • the latest edition CRL memory processing unit 239 is a processing unit operable to memorize a latest edition CRL which is extracted from the CRL received hitherto and hold it in the decrypting device 200f.
  • the processing unit includes a latest edition detecting processing unit 2391, a latest edition detecting information memory unit 2392 and a memory unit 2393.
  • the latest edition detecting processing unit 2391 conducts a verification processing whether the CRL is the latest or not with every receiving of the CRL bound to the DVD 2a.
  • the latest edition detecting information memory unit 2392 memorizes the latest edition detecting information of the CRL (i.e. file size of the list) held by the decrypting device 200f.
  • the memory unit 2393 memorizes the hashing value Hash (i.e. l28bit) of the CRL held by the decrypting device 200f.
  • Hash i.e. l28bit
  • the reason for that is, when a large size of the CRL is memorized and held in the IC card 210f inside, the cost effectiveness for the IC card 210f will become high. That is, in this embodiment, a latest edition CRL memory unit 250 is installed outside of the IC card 210f (and inside of the decrypting device 200f) and memorizes a latest edition CRL so as to memorize/hold only the hashing value Hash of the list in the memory unit 2393 of the IC card 210f inside.
  • the latest edition detecting processing unit 2391 executes the verification processing whether the CRL is a latest edition or not as a mid-processing of holding (or not holding) a CRL as shown in the flow chart of Fig . 11A. That is, the latest edition detecting processing unit 2391 compares a file size which is recoded in a header of the CRL bound to the DVD 2a with a size memorized in the latest edition detecting information memory unit 2392 (S101). This comparison is made on the basis of the characteristic of the CRL that the revoked computers increase monotonously and the file size becomes large as the time goes by.
  • the file size of the latest edition is to be updated by storing (overwriting) the list in the latest edition detecting information memory unit 2392 (S102).
  • the latest edition detecting processing unit 2391 calculates a hashing value Hash of a latest edition list, stores the hashing value Hash in the memory unit 2393 (S103), stores the latest edition list in a latest edition CRL memory unit 250 (S104), and transfers the latest edition list to the CRL checking unit 235 (S105).
  • the latest edition detecting processing unit 2391 ends the confirmation verification processing immediately.
  • a processing of reading out the latest CRL is executed, as shown in Fig. l lB.
  • the latest edition detecting processing unit 2391 reads out the latest edition list from the outside of the memory unit, that is, the latest edition CRL memory unit 250 (Sill), calculates the hashing value Hash of the latest edition list (S112), and verifies whether the calculated hashing value Hash matches the hashing value Hash memorized in the memory unit 2393 (S113) . This verification is conducted for detecting whether a replacement is carried out or not. When it has been not carried out, the two hashing values Hash match.
  • the latest edition detecting processing unit 2391 transfers the latest edition list read out from the CRL latest edition list memory unit 250 to the CRL checking unit 235 (S114) and ends the latest edition list reading-out processing.
  • the latest edition detecting processing unit 2391 stops the processing (S115) and ends the reading-out processing .
  • the latest edition detecting processing unit 2391 assumes that some unauthorized use was conducted, and terminates all the processing (rejects an authentication of the partner computer) after the processing of using the CRL.
  • the latest list within the read out CRL from the DVD 2a is held in the latest edition CRL memory unit 250 and be used .
  • it is avoidable to authenticate a partner device using the old CRL.
  • the file size is used in a way for confirming the latest edition list according to the sixth embodiment, however, a numbers of the certificate (the serial entry number) registered in the CRL may also be used for this confirmation processing.
  • Fig . 12 illustrates an external view of an arrangement of the HD-DVD player which includes the decrypting devices 200a to 200f for the recording medium according to the embodiment of the present invention .
  • the HD-DVD player 200 is a system that plays back a content
  • IC card 210a to 210f (i.e. movies) recorded on the DVD 2a to 2d using the IC card 210a to 210f. It comprises of a card inserter 2100 that the IC card 210a to 210f are to be inserted, a DVD-ROM drive 2200 that plays back the DVD 2a to 2d, and the descrambler 260 that is implemented inside of the HD-DVD player 200.
  • the IC card 210a, to 210f is a plastic card, that the IC tip, including CPU, is embedded and a card which is able to verify whether an access is the qualified access or not when reading out the data.
  • the IC tip including CPU
  • the IC tip including CPU
  • the digital production recorded on the DVD 2a to 2d can be protected from illegal copying.
  • the development of the present invention in the multimedia related products circulation market is to be prospected.
  • Fig . 13 illustrates a functional block diagram that shows an overall configuration of the recording medium copyright protection system lg according to the seventh embodiment. Now that the functional elements of the recording medium copyright protection system lg are put the same numbers corresponding to those of the recording medium copyright protection system la of the first embodiment. The explanation is to be omitted except the different part of the recording medium copyright protection system la .
  • the encryption device 100a stores two keys, the device key ring KD_A and the content key Kc to the device key ring memory unit 112 and the content key memory unit 113, respectively. Then the content key Kc is encrypted with the device key ring KD_A with which the hashing value Hash of the CRL is associated and generates the encrypted content key. That is, the encryption device is double layered with the device key KD_A and the content key Kc. This construction usually makes the encryption intensify against an attack. However, there are licensors who want to further intensify the encryption.
  • the terminal device llOe in the encryption device lOOe according to the seventh embodiment further intensifies the encryption by adopting an triple layered construction, with the device key KD_A, the content key Kc, as mentioned-above, and a disk key Kd .
  • the terminal device l lOe in the encryption device lOOe includes a hashing function processing unit 114 that memorizes the disk key Kd, and an Enc unit 142, 143 besides the CRL memory unit 111, the device key ring memory unit 112, content key memory unit 113, the hashing function processing unit 114 and the Ex-OR unit 115.
  • this disk key Kd is located in the upper layer of the DVD with considering that the DVD records a plurality of content (approx.7).
  • the Enc unit 142 encrypts the disk key Kd memorized in the disk key memory unit 141 with the exclusive OR between the hashing value Hash and the each device key KD_A and generates an encrypted disk key ring.
  • the Enc unit 143 encrypts the content key Kc memorized in the content key memory unit 113 with the disk key Kd and generates the encrypted content key.
  • the terminal device 160 binds the encrypted content, the CRL, the encrypted disk key ring generated by the Enc unit 142,143 and the encrypted content key, to the DVD2e.
  • the content key decrypting unit 220f in the IC card 210g which is in the decrypting device 220f memorizes only the device key KD_A and decrypts the disk key Kd by decrypting the encrypted disc key ring bound to the DVD2e with the device key KD_A and the hashing value Hash of the CRL. Furthermore, it decrypts the content key Kc by decrypting the encrypted content key bound to DVD2e with the disk key Kd.
  • the content key decrypting unit 220f includes Dec processing unit 245 and 246 besides the device key memory unit 221, the hashing function processing unit 222 and the Ex-OR unit 223.
  • the Dec processing unit 245 decrypts the disk key Kd by decrypting the encrypted disk key ring passed by the descrambler 260 with the hashing value Hash of the device key KD_A and the hashing value Hash of the CRL.
  • the Dec processing unit 246 decrypts the content key Kc by decrypting the encrypted content key passed from the descrambler 260 with the disk key Kd.
  • the recording medium copyright protection system lg according to the seventh embodiment should give the CRL bound to the DVD2e for obtaining the key for decrypting the content in return.
  • This enables not only to eliminate the illegal descrambler 260 that conducts a replacement of the CRL, but also to intensify the copyright protection further, because the secret key is triple layered. As a result, the encryption intensity increases against an attack.
  • the terminal device l lOe may possibly include further a confirmation data outputting unit that outputs the confirmation data which is to be a criterion for verifying whether the decrypted content key is the qualified key or not in the decrypting device 200k, to the DVD2e.
  • this confirmation data outputting unit may function as outputting a data obtained by encrypting the predetermined fixed-pattern data with the content key memorized in the content key memory unit 113 as a confirmation data to the DVD2e.
  • the content key decrypting unit 220f may include a content decrypting key checking unit 228, a content key checking unit 242 and a content decrypting key checking unit 244 to verify whether the decrypted content key is the qualified key or not.
  • FIG. 14 illustrates an external view of an arrangement of a recording medium copyright protection system Ih according to the eighth embodiment. Now that the functional elements of the recording medium copyright protection system lh are put the same numbers corresponding to those of the recording medium copyright protection system lg of the seventh embodiment. The explanation is to be omitted except the different part of the recording medium copyright protection system lg.
  • the terminal device llOe in the encryption device lOOe encrypts the disk key Kd memorized in the disk key memory unit 141 with the exclusive OR value between the hashing value Hash and the each device key KD_A, and generates the encrypted disk key ring, along with that, encrypts the content key memorized in the content key memory unit 113 with the disk key Kd and generates the encrypted content key.
  • the terminal device l lOe increases the encryption intensity against an attack, however a load for the two decrypting processing becomes high.
  • the content key decrypting unit 220f also, a load for the two decrypting processing becomes high.
  • the terminal device llOf in the encryption device lOOf according to the recording medium copyright protection system lh reduces the load by cutting out a processing of encrypting the content key Kc by using a medium ID memory unit 144 to memorize the medium ID and a MID that specific to every DVD, in place of the content key memory unit 113 and a one-way function unit 145 that generates a content key Kc based on the medium ID, and the MID in place of the Enc unit 143.
  • the terminal device llOf in the encryption device lOOf further includes the medium ID memory unit 144 and the one-way function unit 145 besides the CRL memory unit 111, the device key ring memory unit 112, the hashing function processing unit 114, the Ex-OR unit 115, the disc key memory unit 141 and the Enc unit 142.
  • the one-way function unit 145 (i.e. Ex-OR) generates a content key Kc by inputting a medium ID memorized in the medium ID memory unit 144, a MID and a disk key Kd into the one-way function.
  • the load of the processing of generating the content key Kc is much lighter than that of the processing of generating the encrypted content key in the Enc unit 143, shown in Fig.13.
  • the terminal device 160 binds an encrypted disk key ring generated by the Enc unit 142, a medium ID outputted by the medium ID memory unit 144 and a MID, besides the CRL and the encrypted content, to the DVD2f.
  • IC card 210h of the decrypting device 200h memorizes only the device key ,KD_A, decrypts the disk key Kd by decrypting an encrypted disk key ring bound to the DVD2e and the hashing value
  • Hash of the CRL and generates the content key Kc based on the medium ID, the MID and the disk key Kd which are bound to DVD2e.
  • the content key decrypting unit 220g further includes a one-way function unit 247, the same construction with the unit 145, besides the device key memory unit 221, the hashing function processing unit 222, the Ex-OR unit 223 and the Dec processing unit 245.
  • the one-way function unit 247 generates the content key Kc by processing the medium ID and the MID put into the one-way function unit 247 with the disk key Kd. A load for this content key
  • Kc generating processing is lighter than that of the content key decrypting processing in the Dec processing unit 246 of Fig .13.
  • the recording medium copyright protection system lh according to the eighth embodiment should pass the CRL bound to the DVD 2a for getting a key for decrypting content in return, same as the first embodiment, this enables to eliminate the descrambler 260 which conducts an unauthorized use such as a replacement of the CRL, and increase the encryption intensity against an attack.
  • the encryption intensity further increases for the copyright protection and reduces the load for the terminal device l lOf and the content key decrypting unit 220g.
  • the terminal device l lOf may further include a confirmation data outputting unit to output the confirmation data to the DVD2f.
  • the confirmation data is to be a criterion for confirming whether a content key decrypted in the decrypting device 200h is the qualified key or not.
  • the confirmation data outputting unit may also encrypt the predetermined fixed-pattern data with the content key memorized in the content key memory unit 113 and output it as a confirmation data .
  • the confirmation data outputting unit may output a data obtained by encrypting the content key with the content key as a confirmation data, to the DVD2f.
  • the content key decrypting unit 220f may include a content decrypting key checking unit 228, a content key checking unit 242, and a content decrypting key checking unit 244.
  • Fig. 15 illustrates a functional block diagram that shows an overall configuration of the recording medium copyright protection system li according to the ninth embodiment. Now that the functional elements of the recording medium copyright protection system li is put the same number corresponding to those of the recording medium copyright protection system la of the first embodiment. The explanation is to be omitted except the different part of the recording medium copyright protection system la.
  • the DVD medium By the way, it is also necessary for a DVD medium to have a copyright protection, as is the same case with the HD-DVD, because the DVD is very high for its affinity with a personal computer (PC). As a result, the DVD can be read out in a personal computer (PC).
  • the PC installs the playback software in the hard disk so as to view a content using the PC as a decrypting device, as is the same case with the DVD-HD.
  • the decrypting device 200a includes the IC card 210a and the descrambler 260 according to the first embodiment, however, the decrypting device for PC generally includes the DVD drive and the playback software.
  • the decrypting device 200i comprises of a DVD drive 400 which includes the descrambler 260 and the authentication processing unit 270, and a DVD playback PC software 500 which includes the IC card 210a and the Dec processing unit 280 in the descrambler 260.
  • the manufacturer for the DVD drive 400 is different from its DVD playback PC software 500.
  • the DVD drive 400 is the same construction with the authentication processing unit 270.
  • the DVD drive 400 includes a public key certificate memory unit for the bus authentication 410, a secret key memory unit for a bus authentication 420, a public key decrypting unit 430, a key calculating unit 440 and a bus encryption unit 450.
  • the public key certificate memory unit for the bus authentication 410 in the DVD drive 400 memorizes a public key certificate for the bus authentication such as an IDE bus and a SCSI bus in advance, and passes the public key certificate for the bus authentication to the DVD playback PC software 500 when the DVD 2a plays back content.
  • the secret key memory unit for the bus authentication 420, the public key decrypting unit 430, the key calculating unit 440 and the bus encryption unit 450 generate a session key K and form a SAC between the DVD playback PC software 500.
  • the DVD playback software 500 includes a certificate qualification checking unit 510, a public key validity checking unit 520, a public key encryption unit 530, a verification unit 540, a key calculating unit 550, a bus decrypting unit 560, a hashing function processing unit 570, a device key memory unit 580, and a Dec processing unit 590, 595.
  • the above each unit is implemented in a software, a CPU in the PC and a memory, etc.
  • the certificate qualification checking unit 510 checks whether the certificate is qualified or not by decrypting the certificate sent from the public key certificate memory unit for the bus authentication 410 with the public key.
  • the public key validity checking unit 520 upon receipt of the notice from the certificate qualification checking unit 510 that the certificate is qualified, checks whether the DVD drive is revoked or not with reference to the CRL for the bus authentication received via the DVD drive 400 and the latest CRL for the bus authentication which read out from the latest edition CRL memory unit 250.
  • the public key encryption unit 530, the verification unit 540, the key calculating unit 550, and the bus decrypting unit 560 receive the notice from the public key validity checking unit 520 that the DVD drive 400 is not revoked, that is, the DVD drive 400 is qualified, a session key K' is generated, and the SAC is formed between the DVD drive 400.
  • the public key encryption unit 530 calculates a hashing value Hash of the CRL.
  • the device key memory unit 580 memorizes the device key
  • the Dec processing unit 590 generates a content key Kc based on the encrypted content key outputted from the bus decrypting unit 560, the hashing value Hash outputted from the hashing function processing unit 570 and the device key kD_A.
  • the Dec processing unit 590 generates a content by decrypting the encrypted content bound to the DVD 2a with the content key Kc.
  • the authentication processing executed between the DVD drive 400 and the DVD playback PC software 500 is an explanation for the authentication processing executed between the DVD drive 400 and the DVD playback PC software 500.
  • the public key encryption unit 530 generates a random number cha upon receipt of the notice that the DVD drive is qualified, encrypts the generated random number cha with the partner public key for the bus authentication and transfers the encrypted random number cha to the public key decrypting unit 430.
  • the public key decrypting unit 430 obtains the random number cha by decrypting the encrypted random number cha with the secret key for the bus authentication memorized in the secret key memory unit for the bus authentication memory unit 420.
  • the public key decrypting unit 430 encrypts the random number cha and the self secret key with the partner public key for the bus authentication, transfers the result of the encryption to the verification unit 540 and passes the random number cha and the secret key to the key calculating unit 440.
  • the key calculating unit 440 calculates the session key K based on the random number cha and the secret key and passes it to the bus encryption unit 450.
  • the bus encryption unit 450 encrypts the encrypted content key ring and sends the doubly encrypted content key ring to the DVD playback PC software 500.
  • the verification unit 540 in the DVD playback PC software 500 verifies whether the random number cha obtained by decrypting with the self secret key matches the original random number cha or not, and when they match each other, the random number cha and the partner secret key are passed to the key calculating unit 550.
  • the key calculating unit 550 calculates the session key K' using the random number cha and the partner secret key and passes to the bus decrypting unit 560.
  • the bus decrypting unit 560 decrypts the doubly encrypted content key ring with the session key K', generates the encrypted content key ring and outputs the encrypted content key ring to the Dec processing unit 590.
  • the hashing function processing unit 570 calculates the hashing value Hash of the CRL outputted from the DVD drive and outputs the hashing value Hash to the Dec processing unit 590.
  • the Dec processing unit 590 decrypts the content key to the encrypted value with the device key KD_A by calculating the exclusive OR between the encrypted content key ring and the hashing value Hash, and further decrypts the content key Kc by decrypting the device key KD_A and passes it to the Dec processing unit 595.
  • the Dec processing unit 595 decrypts the encrypted content bound to the DVD 2a with the content key Kc and plays back the content.
  • the decrypting device 200i of the recording medium copyright protection system li that is, the PC including the DVD drive 400 and the DVD playback PC software 500 should pass the CRL bound to the DVD 2a for getting a key for decrypting a content in return, as is the same case with the HD-DVD.
  • the computers to eliminate an illegal descrambler 260 which conducts an unauthorized use such as a replacement of the CRL and the copyright is thus protected .
  • the decrypting device 200i that is, when the case that a PC is connected to Internet, the decrypting device 200i accesses the terminal device 300 when the DVD2e plays back, downloads the latest CRL from the terminal device 300 and checks whether the DVD drive 400 is revoked or not in the public key validity checking unit 520 using the downloaded latest CRL.
  • the decrypting device 200i includes the DVD drive 400 and the DVD playback software 500, however, the DVD playback PC software only has, what we call, a "descramble" function. So, in this case, it is assumed that the decrypting device 200i should be used with connecting to the licensor supply protection module A. In other words, the PC should be fixable for the IC card 210a and the decrypting device 200i, and the DVD drive 400 may be included in the IC card 210a and the DVD playback PC software partially in the Dec processing unit in this PC.
  • the content may be played back by decrypting the encrypted content read out from the DVD drive 400 after setting the SAC between the DVD drive 400 and the IC card 210a, and between the IC card 210a and the Dec processing unit 595 in the DVD playback PC software.
  • the encryption device 100a may further include the confirmation data outputting unit to output the confirmation data, which is to be a criterion for confirming that the content key decrypted in the decrypting device 200i is the qualified key or not, to the DVD 2a.
  • the content key decrypting unit 220i includes the content decrypting key checking unit 228 that checks whether the content key is the qualified key or not, the content key checking unit 242, and the content decrypting key checking unit 244.
  • the digital production is transmitted via the DVD medium
  • a system for transmitting the digital production via the transmission medium such as Internet is applicable to the present invention.
  • it is applicable for a system by replacing the way of "recording to the record medium” to “sending to the transmission line”, and “reading out from the recording medium” to “receiving from the transmission line", to the present invention.
  • the present invention is applicable for a system that transfers the digital production by combining a recording medium and a transmission medium. That is, an encrypted content may well be supplied by a recording medium such as DVD, and a key for decrypting the encrypted content and a CRL are supplied by a transmission medium, the network delivery.
  • a key is to be supplied by the recording medium
  • an encrypted content is to be supplied by a transmission medium, the network delivery, is also applicable.
  • this system that transfers the digital production by combining of the recording medium and the transmission medium it is selectable what can be supplied by the recording medium within the encrypted contents and the keys, and what can be supplied by the transmission medium, the network delivery.
  • the copyright protection module is also applicable.
  • a LSI 210i which integrates each configuration of IC card 210a to 210f to one chip can be applied and the LSI 210i may well be mounted to a socket 210j or mounted by soldering on to a board.
  • the IC card 210a to 210f is supplied by the copyright protection licensor, however, the IC card 210a to 210f manufactured by the manufacturer of the decrypting device 200a to 200f or the LSI 210i can be used in place of the IC card 210a to 21 Of.
  • the copyright protection system according to the present invention is applied to a wide area between the encryption device 100a to lOOf of the copyright protection licensor or the content manufacturer and the decrypting device 200a to 200f used by the user, however, the system is also applicable to a small area, such as domestic area or to the intranet when a processing of the cipher communication is executed.
  • Fig . 17 is a block diagram that shows an overall configuration copyright protection system which establishes a cipher communication with the content via home LAN
  • Fig. 18 is a block diagram that shows a construction of an AV server lOOj, each plasma TV 200k, a VTR 200m, and a DVD recorder 200n of Fig. 17 and Fig. 18.
  • Fig. 18 since the construction of the plasma TV 200k, the VTR 200m, and the DVD recorder 200n are the same with the copyright protection system, only the plasma TV 200k is shown as an example.
  • the copyright protection system lj includes a home LAN 30 as a transmission medium, an AV server lOOj which connects to the home LAN 30, a plasma TV 200k as a client, a VTR 200m and a DVD recorder 200n.
  • the AV server lOOj has almost same components with the encryption device 100a as shown in Fig . 1, the AV server lOOj stores the content received from out-of-home in the content memory unit 161 which includes a HDD and delivers the content by request of the memorized content delivery via the home LAN 30. This is the different point.
  • the AV server lOOj receives content from a broadcast station lOOg via a broadcast (BS, CS) or broadcast network of a terrestrial broadcast 3a, from a server lOOh of a content provider via internet network 3b, or from a CATV broadcast lOOi via CATV network 3c, and memorizes the content to the content memory unit 161.
  • the AV server lOOj includes a session key memory unit 112a.
  • a SAC is formed between the plasma TV 200k based on the delivering request.
  • a session key Kses obtained when the SAC is formed, is memorized in the session key memory unit 112a and encrypts the content key Kc with the session key Kses in place of the device key used in the encryption device 100a .
  • the encryption device 100a encrypts the content key Kc with the device key, that is, the session key Kses is used in place of the device key. This is the different point from the encryption device 100a.
  • the plasma TV 200k, the VTR 200m and the DVD recorder 200n are almost the same components with the decrypting device 200a as shown in Fig . 1, however, the plasma TV 200k, the VTR 200m and the DVD recorder 200n each include a session key memory unit 221a for memorizing a session key obtained when the SAC is formed between the AV server lOOj, and decrypt the content key Kc with the session key Kses memorized in the session key memory unit 221a. This is the different point with the decrypting device 200a which decrypts the content key Kc with the device key KD_A.
  • a processing between the AV server lOOj and the plasma TV 200k according to the copyright protection system lj is to be described below with focusing on the different point with the copyright protection system la.
  • the AV server lOOj conducts a SAC processing between the plasma TV 200k using an Elliptical Curve Cryptography (ECC) by request of the content delivery from a client, the DVD recorder 200n .
  • ECC Elliptical Curve Cryptography
  • the AV server lOOj and the plasma TV 200k hold the same value session key Kses each other.
  • the AV server lOOj memorizes the session key Kses in the session key memory unit 112a.
  • the content key decrypting unit 220h in the copyright protection module 210k of the plasma TV 200k memorizes session key Kses to the session key memory unit 221a.
  • the Ex-OR unit 115 in the AV server lOOj carries out the exclusive OR between the session key Kses which is shared between the plasma TV 200k and the hashing value of the CRL.
  • the Enc unit 116 encrypts the content key Kc with a value obtained by the Ex-OR unit as a key.
  • the Enc unit 162 encrypts a content which is a requested AV data with the content key.
  • the AV server lOOj sends the encrypted content key,the encrypted content and the CRL to the plasma TV 200k via the home LAN 30.
  • the copyright protection module 210k in the plasma TV 200k receives the CRL and the encrypted content which has been sent via the home LAN 30.
  • the descrambler 260 receives the CRL and the encrypted content.
  • the Ex-OR unit 223 in the content key decrypting unit 220h which is in the copyright protection module 210k of the plasma TV 200k carries out the exclusive OR between the session key Kses memorized in the session key memory unit 221a and the hashing value of the CRL obtained by the hashing function processing unit 222.
  • the Dec processing unit 224 decrypts the content key with a value obtained in the Ex-OR unit 223 as a key.
  • a SAC processing is conducted between the copyright protection module 210k in the plasma TV 200k and the descrambler 260 based on the CRL and the session key KK is shared .
  • the authentication unit 237 in the copyright protection module 210k encrypts the content key Kc with the shared session key KK and sends the content key Kc to the descrambler 260.
  • the authentication unit 277 in the descrambler 260 decrypts the content key Kc.
  • the Dec processing unit 280 decrypts the encrypted content with the obtained content key Kc.
  • the session key Kses is used in place of the device key, however, a secret key Ks can be shared between the AV server lOOj and the plasma TV 200k in advance, and be used in place of the session key.
  • predetermined fixed pattern data described above can be sent with the CRL and determines in the copyright protection module 210k.
  • various kinds of encryption devices or decrypting devices are realized by combining the above processing of ten embodiments. That is, in the case of the encryption, ( 1) when we call each processing; i. en encryption for a secret key ii. an transformation by the one-way function as a layer, it is selectable for the system to be double layered or triple layered, (2) as for a key for the encryption of the content, it is selectable for the key to be a content key or to be a function value obtained by transforming a medium ID in the one-way function, (3) as for the associating object for the hashing value of the CRL, it is selectable for the object to be the device key, the disk key, the content key, the medium ID, the session key or to be the function value obtained by transforming the medium ID in the one-way function.
  • various forms of the encryption device, the decrypting device and the IC card are realized by combining the above independent three parameters ( 1), (2) and (3) arbitrary.
  • a number of layers for the above encryption (or decrypting) of a secret key, etc are not limited only 1 to 3. The layer can be exceeded of 3.
  • the encryption device, the decrypting device, and the IC module (secret key generation device) for the present invention is to be described as below.
  • an encrypting method in an encryption device that encrypts a digital production and outputs the encrypted digital production to a recording medium or a transmission medium includes:
  • an encrypting method in an encryption device that encrypts a digital production and outputs the encrypted digital production to a recording medium or a transmission medium includes:
  • an encrypting step for repeating a chain encryption and transformation process, for a first secret key thorough an (n-l) th secret key, of transforming a medium identification information with a one-way function using the first secret key out of n ( ⁇ l) secret keys, encrypting the digital production using the transformed medium identification information, and in the case of n ⁇ 2, encrypting an (i-l) th secret key using an i (2 ⁇ i ⁇ n) th secret key; and (2) an outputting step for outputting the encrypted first secret key thorough the (n-l) th secret key to the recording medium and the transmission medium, wherein the chain encryption or transformation process using at least one of the first secret key through the n th secret key includes a second step for (1) transforming the secret key, prior to the encryption, using an attribute valued dependent on details of a CRL which is an information list for specifying a revoked public key certificate, or (2) transforming the medium identification information obtained by the transformation with the attribute value.
  • a decrypting method in a decrypting device that decrypts an encrypted digital production includes : (1) a first decrypting step for repeating a chain decrypting process, for n ( ⁇ 2) encrypted secret keys, of obtaining the encrypted digital production, the n encrypted secret keys and a CRL which is an information list for specifying a revoked public key certificate via a recording medium or a transmission medium, and decrypting a first encrypted secret key out of the n encrypted secret keys using a pre-holding secret key, and further decrypting an encrypted second secret key with the obtained first secret key; and
  • a decrypting method in a decrypting device that decrypts an encrypted digital production includes: (1) a first decrypting step for repeating a chain decrypting process, for n ( ⁇ l) encrypted secret keys, of obtaining the encrypted digital production, a medium identification information, n ( ⁇ l) encrypted secret keys and a CRL which is an information list for specifying a revoked public key certificate via a recording medium or a transmission medium, decrypting a first secret keys using a pre-holding secret key, andjn the case of n ( ⁇ 2), decrypting an encrypted second secret key with the obtained first secret key.
  • a second decrypting step for transforming the medium identification information by a one-way function using the n th secret key used for the final decrypting, and decrypting the digital production with the transformed medium identification information, wherein at least one of the chain decrypting processes using the first secret key though the n th secret key or the transformation of the medium identification information includes a forth step for (1) transforming the secret key used for the decrypting or the transformation, prior to the decrypting or the transformation, using an attribute value dependent on details of the CRL or (2) transforming the medium identification information obtained by the transformation using the attribute value.
  • the encryption device of the copyright protection system, the AV server, the decrypting device and the client can use a server, a set top box, a personal computer, a digital television, a VTR, a DVD recorder, a printer, a cellular phone and a personal digital assistance for delivering and receiving the content via the recording medium or the transmission medium as a computer device.

Abstract

An encryption device, a decrypting device, a secret key generation device, a copyright protection system and a cipher communication device comprise: a CRL memory unit 111 that memorizes a CRL, a device key ring memory unit 112 that memorizes a peculiar device key KD A in every IC card 210a used in a decrypting device 200a, a content key memory unit 113 that memorizes a content key Kc which is a secret key for decrypting content, a hashing function processing unit 114 that calculates a hashing value of the CRL memorized in the CRL memory unit 111, an Ex-OR unit 115 that carries out an exclusive OR between the hashing value and the device key KD A memorized in the device key ring memory unit 112, and an Enc unit 116 that encrypts the content key Kc memorized in the content key memory unit 113 with an output value of an Ex-OR unit 115.

Description

DESCRIPTION
AN ENCRYPTION DEVICE, A DECRYPTING DEVICE, A SECRET KEY GENERATION DEVICE, A COPYRIGHT PROTECTION SYSTEM AND A CIPHER COMMUNICATION DEVICE
Technical Field
The present invention relates to an encryption device and a decrypting device for protecting copyrights when transmitting digital productions via a recording medium or a transmission medium. More specifically, the present invention relates to a protection technique that is to protect against an attack enacted by a replacement of a Certificate Revocation List (CRL) specifying a revoked public key certificate.
Background Art
When a digital production is transmitted from a (first) device to another (second) device, prior to the transmission, a computer authentication is conducted to avoid a copyright infringement by an authorized obtainment. The first computer is to authenticate the second computer. In other words, the first computer makes sure that the second computer is a qualified computer to transmit.
For example, a first computer sends a random number to a second computer, then the second computer encrypts the random number with its own secret key (i.e. digital signature) and replies it to the first computer. Finally, the first computer verifies the replied encrypted text (or the digital signature) using the second computer's public key.
However, the authentication using said public key encryption should be based on the condition that the public key itself is not revoked .
Therefore, in recent years, a "public key certificate" for
l - proving that a public key is a qualified key for each user, is issued from an organization or a company called "certificate authority" (CA) . Among those issued public key certificates, there are certificates for the users who have a secret key expired or stolen, or do something illegal. For nullifying those certificates (or notifying other users that those certificates are nullified), a Certificate Revocation List (hereinafter referred to as a "CRL", a "public key certificate revocation list" or an "revocation list"), an information list for specifying the revoked public key certificate is issued. Accordingly, when authenticating a communication partner with the partner's public key, a public key certificate is obtained from the communication partner, and upon confirmed that the obtained public key certificate is not listed on the CRL, and then the above-mentioned authentication processing is executed so as to avoid transmitting a valuable digital production to an unauthorized communication partner.
There are devices and systems (refer to Japanese patent NO. 3199119 ) in which a key checking is conducted with only referring to the public key certificate, however, such devices and systems cannot cover when there are certificates for the users who have a secret key expired or stolen, or do something illegal, as stated above.
However, it is not possible for every computer to obtain the qualified CRL and check the validity of the public key certificate of the communication partner. As a result, unauthorized use is conducted.
For example, a device, such as a DVD drive device which plays back a DVD (digital Video/Versatile Disc), on which digital works (i.e. movies) are recorded, obtains the qualified CRL via a DVD and reads out the latest CRL from the DVD, and then authenticates the communication partner computer (a computer that operates an integrated playback processing circuit or playback software) with reference to the CRL. In the process of reading out the CRL, there is a possibility that the CRL could be replaced with the old one.
As a result, although a computer is listed on the qualified (the latest) CRL as a revoked computer, it may be possible for the revoked computer to be transmitted a digital production illegally with a revoked public key that is not listed on the replaced old CRL yet.
Also, when a computer which has already held a CRL obtains a new CRL, it is necessary to compare the two lists to figure out which is the latest, then holds only the latest one, that is, it is necessary to verify accurately which lists should be held.
Accordingly, the first object of the present invention is, in the light of the above-mentioned problem, to provide an encryption device, a decrypting device, a secret key generation device, a copyright protection system and a cipher communication device that can defend from an attack enacted by a replacement of a CRL, and as a result, transmit a digital production safely.
And the second object of the present invention is to provide a cipher communication device that can specify the latest CRL accurately when new CRL is obtained, and hold only the latest list in place of the old one.
Disclosure of Invention
In order to achieve the above first object, an encryption device according to the present invention in an encryption deice that encrypts and outputs the digital production to a recording medium or a transmission medium, and comprises of a digital production memory unit operable to memorize a digital production, a first secret key memory unit operable to memorize a first secret key which is used for the encryption of the digital production, a second secret key memory unit operable to memorize a second secret key corresponding to a decrypting device that decrypts an encrypted digital production, a CRL memory unit operable to memorize a CRL which is an information list that specifies a revoked public key certificate, an attribute value calculating unit operable to calculate an attribute value dependent on details of a CRL based on the CRL memorized in the CRL memory unit, a transforming unit operable to transform the second secret key memorized in the second secret key memory unit with the attribute value calculated in the attribute value calculating unit, a first encryption unit operable to encrypt the first secret key memorized in the first secret key memory unit with the second secret key which is transformed by the transforming unit, a second encryption unit operable to encrypt the digital production memorized in the digital production memory unit with the first secret key memorized in the first secret key memory unit and an outputting unit operable to output the CRL memorized in the CRL memory unit , the first secret key encrypted by the first encryption unit and the digital production encrypted by the second encryption unit to the recording medium or the transmission medium.
As a result, the encrypted digital production, the encrypted first secret key which is used for encrypting the digital production, and the CRL are outputted from the encryption device. The encrypted first secret key is not encrypted only with the second secret key which corresponds to the decrypting device, but also with the second secret key on which the details of the CRL has been reflected . Accordingly, when the CRL is replaced, the details of the CRL received by the decrypting device are different from the list reflected on the second secret key held in the decrypting device itself, that is, the second secret key is transformed. As a result, the decrypting device which received the encrypted digital production, the encrypted first secret key and the CRL can not decrypt the encrypted first secret key to the original first secret key using the second secret key transformed as such. Therefore, the decrypting device can not decrypt the encrypted digital production right. As a result, the safe transmission of the digital production, having a defending function against an attack enacted by a replacement of the CRL, is realized.
Also, the encryption device mentioned above, may further include a confirmation data outputting unit operable to output a confirmation data which is to be a criterion for confirming whether the first secret key decrypted by the decrypting device is a right key or not. For example, the confirmation data outputting unit outputs a data obtained by encrypting the predetermined fixed-pattern data with the first secret key memorized in the first secret key memory unit as a confirmation data to the recording medium or the transmission medium or the confirmation data outputting unit outputs a data obtained by encrypting the first secret key memorized in the first secret key memory unit with the first secret key as a confirmation data to the recording medium or the transmission medium.
As a result, the decrypting device which received the encrypted digital production outputted from the encryption device, the encrypted first secret key, and the CRL can verify whether the CRL has been replaced or not, that is, whether the first secret key is decrypted rightly or not, so as to avoid useless processing of decrypting the digital production with a wrong key.
Also, an encryption device is an encryption device that encrypts and outputs the digital production to a recording medium or a transmission medium, and comprises of a digital production memory unit operable to memorize the digital production, a first secret key memory unit operable to memorize a first secret key which is used for the encryption of the digital production, a second secret key memory unit operable to memorize a second secret key corresponding to a decrypting device that decrypts an encrypted digital production, a CRL memory unit operable to memorize a CRL which is an information list that specifies a revoked public key certificate, a first encryption unit operable to encrypt the first secret key memorized in the first secret key memory unit with the second secret key which is memorized in the second secret key memory unit, an attribute value calculating unit operable to calculate an attribute value dependent on details of a CRL based on the CRL memorized in the CRL memory unit, a transforming unit operable to transform the first secret key memorized in the first secret key memory unit with the attribute value calculated in the attribute value calculating unit, a second encryption unit operable to encrypt the digital production memorized in the digital production memory unit with the first secret key transformed by the transforming unit and an outputting unit operable to output the CRL memorized in the CRL memory unit , the first secret key encrypted by the first encryption unit and the digital production encrypted by the second encryption unit to the recording medium or the transmission medium.
As a result, the encrypted digital production, the encrypted first secret key which is used for encrypting the digital production, and the CRL are outputted from the encryption device. The encrypted digital production is not encrypted only with the first secret key but also with the first secret key on which the details of the CRL has been reflected. Accordingly, when the CRL is replaced, the details of the CRL received by the decrypting device are different from the list reflected on the first secret key held in the decrypting device itself, that is, the first secret key is transformed. As a result, the decrypting device which received the encrypted digital production, the encrypted first secret key and the CRL can not decrypt the encrypted digital production rightly using the first secret key transformed as such. As a result, the safe transmission of the digital production, having a defending function against an attack enacted by a replacement of the CRL, is realized.
Also, as mentioned above, it is possible for the decrypting device which received the encrypted digital production outputted from the encryption device, the encrypted first secret key and the CRL to judge whether the CRL is replaced or not, that is, whether the secret key used for the encryption of the digital production is decrypted rightly or not by outputting a first secret key with an attachment of a confirmation data of a CRL, on which the first secret key has been reflected, from the encryption device, so as to avoid an useless processing of decrypting the digital production with a wrong key.
In order to achieve the above second object, a cipher communication device according to the present invention is a cipher communication device that establishes a cipher communication with a partner device using a public key of the partner device, and comprises of a memory unit operable to memorize a CRL which is an information list for specifying a revoked public key certificate, an obtaining unit operable to obtain a new CRL, a storage unit operable to compare a size of an obtained CRL and the CRL memorized in the memory unit, and when the obtained CRL is larger in size, memorizes the obtained CRL to the memory unit and updates, and a communication unit operable to judge a key validity of a partner device with referring to the CRL memorized in the memory unit, and when the public key is not revoked, establishes a cipher communication with the partner device using the public key.
It may be possible for the above function of storage unit to change to compare the number of the certificate that is listed on the obtained CRL with the number of the certificate that is listed on the CRL memorized in the above memory unit, and when the certificate, listed on the obtained CRL, is large in number, memorizes it to the above memory unit and updates.
As a result, since the number of the public key certificate listed on the CRL is increased as the time goes by, the cipher communication device can always hold a CRL that is large in size (or large in registration number), that is, a latest list. The present invention, as stated above, realizes the digital production to be transmitted safely, against an attack of a replacement of the CRL. The practical value for the present invention is extremely high in terms of delivering/distributing of the digital production via a transmission line such as Internet or a recording medium such as DVD, which is active in these days.
The present invention can be realized as a decrypting device which corresponds to the above encryption device or a secret key generation device, realized as a copyright protection system including the encryption device and the decrypting device, realized as an encryption method with steps of the characteristic unit that is comprised of the encryption device, the decrypting method or the cipher communication method, or realized as a program for having the computers to execute above steps. In addition, needless to say, the program according to the present invention can be marketed via a recoding medium such as a DVD or a transmission medium such as Internet.
Brief Description of Drawings These and other objects, advantages and features of the invention will become apparent from the following description thereof taken in conjunction with the accompanying drawings that illustrate a specific embodiment of the invention. In the Drawings: Fig. 1 is a functional block diagram that shows an overall configuration of the recording copyright medium protection system la according to the first embodiment.
Fig. 2 is a diagram that shows a constructional example of the CRL.
Fig. 3 is a diagram that shows a constructional example of the public key certificate for the copyright protection licensor.
Fig. 4 is a diagram that shows a constructional example of the public key certificate for the manufacturer of the player. Fig . 5 is a diagram that shows the sequence of the processing conducted between the IC card 210a in the decrypting device 200a and the descrambler 260.
Fig. 6 is a functional block diagram that shows an overall configuration of the recording medium copyright protection system lb according to the second embodiment.
Fig . 7 is a functional block diagram that shows an overall configuration of the recording medium copyright protection system lc according to the third embodiment. Fig. 8 is a functional block diagram that shows an overall configuration of the recording medium copyright protection system Id according to the forth embodiment.
Fig. 9 is a functional block diagram that shows an overall configuration of the recording medium copyright protection system le according to the fifth embodiment.
Fig. 10 is a functional block diagram that shows an overall configuration of the recording medium copyright protection system according to the sixth embodiment.
Fig. 11 A is a flow chart that shows the verification processing conducted in the latest edition detecting processing unit 2391 in Fig .10.
Fig. 11 B is a flow chart that shows the latest edition list reading-out processing.
Fig . 12 is an external view of the HD-DVD player for which the decrypting devices 200a to 200f for the recording medium according to the first and the second embodiments are applied .
Fig . 13 is a functional block diagram that shows an overall configuration of the recording medium copyright protection system lg according to the seventh embodiment. Fig. 14 is a functional block diagram that shows an overall configuration of the recording medium copyright protection system lh according to the eighth embodiment. Fig . 15 is a functional block diagram that shows an overall configuration of the recording medium copyright protection system li according to the ninth embodiment.
Fig. 16 is a diagram that shows an example of the copyright protection module which includes LSI.
Fig. 17 is a block diagram that shows an overall configuration copyright protection system which establishes a cipher communication of the contents via small-scale home LAN.
Fig. 18 is a block diagram that shows a construction of the AV server lOOj and the plasma TV 200k of Fig. 17.
Best Mode for Carrying out the Invention
The following is an explanation of the copyright protection system according to the embodiments of the present invention with reference to figures.
(The first Embodiment)
Fig . 1 is a functional block diagram that shows an overall configuration of the recording medium copyright protection system la according to the first embodiment.
A recording medium copyright protection system la is a system that records a content encrypted on a DVD 2a as a recording medium, or reads out the encrypted content from the DVD 2a and decrypts it. The system includes an encryption device 100a that memorizes a content encrypted on the DVD 2a, a decrypting device 200a that reads out the encrypted content from the DVD 2a and decrypts it, and a terminal device 300 that is used by a Certificate Authority (CA) issuing a CRL, etc.
The encryption device 100a comprises two terminal devices, the terminal device 110a that the copyright protection licensor uses and a terminal device 160 that a content manufacturer uses.
The decrypting device 200a, for example, is an HD-DVD player with the ability to reproduce a content of a picture level HD (1125i/750p), and includes an IC card 210a supplied by a copyright protection licensor, a descrambler 260 for the player manufacturer and a DVD-ROM drive (not shown in the Figure) which reads out the encrypted content from the DVD 2a.
The terminal device 110a that the copyright protection licensor uses is a computer device that provides information for the decrypting device 200a to have a copyright protection, that is, to provide a CRL, a content key for decrypting the content, and an encrypted content key ring . It comprises a CRL memory unit 111, a device key ring memory unit 112, a content key memory unit 113, a hashing function processing unit 114, an Ex-OR unit 115 and an Enc unit 116.
The CRL memory unit 111 accesses the terminal device 300 regularly via a communication network, i.e. Internet, etc, and updates/memorizes a latest CRL that the Certificate Authority (CA) provides. The CRL, as shown in Fig.2, includes a "file header" field, a "general" field and a "revoked list" field. In the area of the "file header", a "name" of the file OΔ D Δ .crl, a "size" of the file 79 KB, a "type" of the file revoked certificate list and a "update" of the file 2001/09/07/12: 34 are included. Also, in the area of the "general" field, a "version" VI, "publisher" O Δ D Δ , "validity start date" 2001/09/06, a "next update due date" 2001/09/16 and a "signature algorithm" md5RSA are included . Also, in the area of the "revoked list", record of a "serial number" for a revoked certificate and a "revoked date" is described in a text form. Since the CRL gives a monotone increase as the time goes by, the newer the CRL is, the more the number of entries (registration units for the CRL) for the revoked certificate serial numbers gives a monotonously increase. It has a characteristic that the size of the file increases monotonously.
The device key ring memory unit 112 memorizes a device key ring KD_A (i.e.128 bit) peculiar to every IC card 210a supplied by the copyright protection licensor, in advance.
The content key memory unit 113 memorizes a content key Kc (i.e.128 bit) which is a secret key for encrypting a predetermined content, for example, music or movie.
The hashing function processing unit 114 is a processing unit that compresses a variable length of the CRL data memorized in the CRL memory unit 111, and converts it to a fixed length (i.e.128 bit) data (hashing value Hash) based on a hashing function. It converts based on a SHA-1 (Secure Hash Algorithm-l) or MD5, for example.
In the Ex-OR unit 115, an exclusive OR between the hashing value Hash calculated in the hashing function processing unit 114 and each device key KD_A memorized in the device key ring memory unit 112 is carried out (the each device key KD_A is transformed with the hashing value).
The Enc unit 116 outputs the content key Kc memorized in the content key memory unit 113 to the Ex-OR unit 115, that is, encrypts with an exclusive OR between the hashing value Hash and the each device key KD_A and generates an encryption content key ring .
Additionally, the hashing function processing unit 114 and the Ex-OR unit 115 in the terminal device 110a transforms the device key KD_A using the CRL memorized in the CRL memory unit 111. This is because by encrypting the content key Kc with the transformed device key KD_A, it enables to make relationship between the encrypted content key outputted from the Enc unit 116 and the CRL. By doing so, it is defaceable from an attack enacted by replacing a CRL at the time of the decrypting processing in a decrypting device 200a as described later. The terminal device 160, used by the content manufacturer, is a write device that records a CRL, which is passed from the terminal device 110a, or the encrypted content key ring, to the DVD 2a. The terminal device 160 includes a content memory unit 161 and an Enc unit 162.
The content memory unit 161 memorizes a predetermined content, for example, music or movie content. The Enc unit 162 encrypts a content memorized in the content memory unit 161 with a content key Kc passed from the terminal device 110a and generates an encrypted content.
As stated above, when the DVD 2a is manufactured in the encryption device 100a which includes two terminal devices 110a and 160, the terminal device 110a reads out the CRL from the CRL memory unit 111. The read out CRL is passed to the hashing function processing unit 114 and the terminal device 160. The hashing function processing unit 114 calculates the hashing value Hash of the CRL and passes it to the Ex-OR unit 115. The Ex-OR unit 115 reads out the device key KD_A, the content key Kc, etc one by one from the device key ring memory unit 112 and calculates the exclusive OR with the hashing value Hash right after the other, then outputs each exclusive OR value to the Enc unit 116. The terminal device 110a reads out the content key Kc from the content key memory unit 113 and passes it to the Enc unit 116 and the terminal device 160. The Enc unit 116 encrypts the passed content key Kc with each exclusive ORs outputted from the Ex-OR unit 115. More specifically, the Enc unit 116 encrypts the content key Kc with an exclusive OR between each value of the device key KD_A and the hashing value Hash. As a result, the Enc unit 116 generates a plurality of the encrypted content keys and passes them in a bunch to the terminal device 160.
The terminal device 160 writes the CRL passed from the terminal device 110a and the encrypted content key ring to the DVD 2a. And then the encrypted content generated by the Enc unit 162 writes to the DVD 2a . The DVD 2a, generated as such, is sold to users with the encrypted content in a condition that the encrypted content key in a bunch and the latest CRL in a bind.
On the other hand, an IC card 210a of the decrypting device 200a, which decrypts such DVD 2a, is comprised of a module (TRM : Tamper Resistance Module) that is used for preventing the computer program from its deliberate change and protecting a copyright by eliminating an illegal descrambler which is listed on the CRL. In other words, the IC card 210a includes a content key decrypting unit 220a which obtains a key for decrypting the encrypted content based on the CRL bound to the DVD 2a and an authentication processing unit 230a that checks whether a communication partner (descrambler 260) is revoked or not, and at the same time, sets a SAC (Secure Authentication Channel) between the descrambler 260 with bilateral authentication form.
The authentication processing unit 230a includes a public key memory unit for the certificate authority (CA) 231, a secret key for the IC card memory unit 232, a public key certificate memory unit for the IC card (the copyright licensor) 233, a random number generation unit 234, a CRL checking unit 235, an elliptic curve cryptography (ECC) processing unit 236, an authentication unit 237 and a buffer memory 238.
The public key memory unit for the certificate authority (CA) 231 memorizes a public key for authority PK_CA used for decrypting a digital signature of the Certificate Authority (CA) in advance.
The secret key memory unit for the IC card 232 memorizes a secret key SK_A for the IC card peculiar to an IC card used for own digital signature by the IC card 210a supplied by the copyright protection licensor in advance.
The public key certificate memory unit for the IC card 233 memorizes a public key certificate for an IC card Cert_A which is a document that the Certificate Authority (CA) proves that the public key PK_A is sure to belong to the IC card 210a. The public key certificate for the IC card Cert_A, as shown in Fig.3, includes an ID for the IC card 210a (copyright protection licensor), a public key for the IC card for a secret key for IC card SK_A, a CA's signature for the public key for the IC card PK_A, an expiry date (for the certificate), and thereof. The random number generation unit 234 generates a random number (i.e. 128bit) as a time modulation value.
The CRL checking unit 235 checks whether the CRL includes the partner's (descrambler 260) ID or not.
The Elliptic Curve Cryptography (ECC) processing unit 236 executes an encryption processing (i.e. 256bit processing unit) based on the elliptical curve when the authentication of the SAC is set.
The authentication unit 237 is a communication interface that communicates with the descrambler 260 via the SAC. The buffer memory 238 holds temporary data such as a random number generated from the random number generation unit 234 or data that the Elliptic Curve Cryptography (ECC) processing unit 236 generates.
The content key decrypting unit 220 includes a device key memory unit 221, a hashing function processing unit 222, an Ex-OR unit 223 and a Dec processing unit 224.
The device key memory unit 221 memorizes a peculiar device key KD_A (it is a secret key, i.e.AES128bit key) into the IC card 210a. The hashing function processing unit 222 is the same construction with the hashing function processing unit 114 of the terminal device 110a and calculates a hashing value Hash (i.e. 128bit) of the CRL bound to the DVD 2a.
The Ex-OR unit 223 calculates an exclusive OR between a hashing value Hash calculated in the hashing function processing unit 222 and each device key KD_A memorized in the device key memory unit 221 (transforms the each device key KD_A with the hashing value).
The Dec processing unit 224 generates a content key Kc by decrypting its own encrypted content key memorized in a predetermined place inside the encrypted content key ring bound to DVD 2a with an exclusive OR value between the device key KD__A and the hashing value Hash.
The descrambler 260, the same construction with the IC card 210a, is configured with a module used for preventing an illegal tamper of the computer program, which includes an authentication processing unit 270 for checking whether a communication partner (IC card 210a) is revoked or not with the CRL, and for setting a SAC between the IC card 210a in a bilateral authentication form, and a Dec processing unit 280 for decrypting an encrypted content read out from the DVD 2a with a content key passed from the IC card 210a and for obtaining a content.
The authentication processing unit 270 comprises a public key memory unit for the certificate authority (CA) 271, a secret key memory unit for the descrambler 272, a public key certificate memory unit for the descrambler (player manufacturer) 273, an random number generation unit 274, a CRL checking unit 275, an Elliptic Curve Cryptography (ECC) processing unit 276, an authentication unit 277 and a buffer memory 278.
The public key memory unit for the certificate authority (CA) 271 memorizes the public key for the certificate authority (CA) of the certificate authority (CA) PK_CA in advance.
The secret key memory unit for the descrambler 272 is supplied by the HD-DVD player 200 manufacturer and memorizes a peculiar secret key for the descrambler SK_i which is used for an own signature for the descrambler 260. The public key certificate memory unit for the descrambler
273 memorizes a public key certificate for the descrambler Cert_i which is a document that the certificate authority (CA) proves that the public key PK_i belongs to the player manufacturer. The certificate descrambler Cert_i, as shown in Fig.4, includes an ID (serial numbers for a certificate) of the descrambler 260 (the player manufacturer), a public key for the descrambler PK_i for a secret key for the descrambler SK_i, a digital signature of the certificate authority (CA) for the secret key for the descrambler PK_i and an expiry date (for the certificate).
The random number generation unit 274 generates a random number (i.e. l28bit) as a time modulation. The CRL checking unit 275 checks whether a partner (IC card
210a) ID number is included in the CRL or not.
The Elliptical Curve Cryptography (ECC) processing unit 276 executes an encryption processing (i.e. 256bit processing unit) based on the elliptical curve when an authentication of the SAC is set.
The authentication unit 277 is a communication interface which communicates with the IC card 210a via the SAC.
The buffer memory 278 holds temporary data such as a random number generated from the random number generation unit 234 or data that the Elliptical Curve Cryptography (ECC) processing unit 276 generated.
Reference is now made to a Fig.5 which illustrates a SAC setting between the IC card 210a and the descrambler 260, and a sequence of a decrypting for the encrypted content recorded on the DVD 2a. Fig . 5 is a diagram that shows the sequence of the processing conducted between the IC card 210a in the decrypting device 200a and the descrambler 260.
When a user instructs to playback the content of the DVD 2a, the random number generation unit 274 of the descrambler 260 generates a first random number y (i.e. l28bit) and memorizes it to the buffer memory 278 (SI). The authentication unit 277 of the descrambler 260 reads out the first random number y memorized in the buffer memory 278 and a public key certificate for the descrambler Cert_i memorized in the public key certificate memory unit for the descrambler 273, and then sends them to the IC card 210a (S2). The authentication unit 237 in the IC card 210a stores the first random number y received from the descrambler 260 and the public key certificate for the descrambler Cert_i in the buffer memory 238. The CRL checking unit 235 checks whether the descrambler 260 is revoked or not based on the CRL passed from the HD-DVD player 200a (S3). More specifically, the checking is conducted based on the fact that the ID for the descrambler 260 is listed on the CRL or not. When the descrambler 260 is not revoked, the authentication unit 237 verifies the public key certificate Cert_i with the public key of the certificate authority (CA) PK_CA (S4). More specifically, the digital signature of the public key authority included in the public key certificate for the descrambler Cert_i is decrypted with the public key of the certificate authority (CA) PK_CA, and a verification is conducted whether the public key certificate for the descrambler Cert_i is sure to belong to the descrambler 260. After the verification, the random number generation unit 234 generates the first random number x (i.e. 128bit) and stores it to the buffer memory unit 238 (S5). The authentication unit 237 reads out the first random number x memorized in the buffer memory 238 and the public key certificate for the IC card Cert_A memorized in the public key certificate memory unit for the IC card 233, and send them to the descramble 260 (S6).
In the descrambler 260, after memorizing the first random number x received from the IC card 210a and the public key certificate for the IC card Cert_A to the buffer memory 278, the CRL checking unit 275 checks whether the IC card 210a is revoked or not based on the CRL passed from a HD-DVD player 200a (S7). In other words, the checking is made by judging whether an ID of the IC card 210a is listed on the CRL or not. When it isn't revoked, the authentication unit 277 verifies the public key certificate for the IC card Cert_A with the public key of the certificate authority (CA) PK_CA (S8). In other words, the authentication unit 277 decrypts the digital signature of the public key authority included in the key public certificate for the IC card Cert_A and the verification is conducted whether the public key certificate for the IC card Cert__A is sure to belong to the IC card 210a. After the verification, the random number generation unit 274 generates the second random number y' (i.e. 128bit), and memorizes it to the buffer memory 278 (S9). The Elliptical Curve Cryptography (ECC) processing unit 276 multiplies the second random number y' and a base point G (constants) on an elliptic curve, thus, generates an y'G. Then the y'G is memorized in the buffer memory 278 (S10). Next, the authentication unit 277 generates a digital signature Sl : =Sig (SK , y'G I |x) that corresponds to the multiplication of y'G and memorizes the digital signature SI to the buffer memory 278 (Sl l). This digital signature is put by signing the secret key SKJ into a bit connection of the multiplication of y'G and the first random x. The symbol " | | " stands for a bit connection, which is, indicating the y'G and the random number x are connected to the digit direction to be resulted to as 256 bit (i .e. y'G to be upper 128 bit, random x to be lower 128 bit). After finished memorizing the digital signature SI, the authentication unit 277 sends the multiplication of the y'G and the digital signature SI which corresponds to the multiplication of the y'G to the IC card 210a (S12).
The authentication unit 237 in the IC card 210 stores a y'G and a digital signature SI which corresponds to y'G to the buffer memory 238, and after that, verifies whether the digital signature SI is the digital signature of the descrambler 260 that corresponds to the y'G | |x or not with the public key for the descrambler PK_i obtained from the public key certificate for the descrambler Cert_i(S13). In other words, the verification is conducted by decrypting the digital signature S I with the public key for the descrambler PK_J, and separates a bit connection between the y'G and the random number x. This enables to confirm the communication partner (descrambler 260) is not an illegal partner. After the verifications mentioned above, the random number generation unit 234 in the IC card 210a generates a second random number x' and memorizes it to the buffer memory unit 238 (S14). The Elliptical Curve Cryptography (ECC) processing unit 236 multiplies the second random number x' and a base point G (constants) on an elliptic curve and thus generates a x'G. Then the x'G is memorized in the buffer memory 238 (S15). Next, the authentication unit 237 generates a digital signature S0 : =Sig (SK_A, x'G | |y) which corresponds to the multiplication of the x'G and memorizes the digital signature SO to the buffer memory 238 (S16). This digital signature is put by signing the secret key SK_A into a bit connection of the multiplication of x'G and the first random number y. After the memorization of the digital signature, the authentication unit 237 sends the multiplication of the x'G and the digital signature SO to the descrambler 260 (S17).
The authentication unit 277 in the descrambler 260 memorizes the multiplication of the x'G received from the IC card 210a and the digital signature SO to the buffer memory 278. After that, the authentication unit 277 verifies whether the digital signature SO is the digital signature of the descrambler 260 which corresponds to the x'G | |y with the public key for the descrambler PK_A obtained from the public key certificate for the descrambler Cert_A (S18). In other words, the verification is conducted by decrypting the digital signature SI with the public key for the descrambler PK_i, and separates a bit connection between the y'G and the random number x. This enables to confirm the communication partner (descrambler 260) is not an unauthorized user.
After the authentication unit 277 in the descrambler verifies that the IC card 210a is not revoked, nor wire tapped, calculates K'=y' (x'G) by multiplying the second random number y' (i.e. l28bit) generated in a self side which is memorized in the buffer memory 278 and the result of the multiplication of x'G obtained from the communication partner, and memorizes the result K' as a session key in the buffer memory 278 (S19).
On the other hand, after the authentication unit 237 in the IC card 210a verifies that the descrambler 260 is not revoked, nor wire tapped, calculates K'=x' (y'G) by multiplying the second random number x' (i.e. l28bit) generated in a self side which is memorized in the buffer memory 238 and the result of the multiplication of y'G obtained from the communication partner, and memorizes the result K as a session key in the buffer memory 238 (S20).
As a result, the IC card 210a and the descrambler 260 can hold the same value key K ( = K'), subsequently they can establish an cipher communication (S21) using the K( = K') as a session key.
After generating of the session key K, the content key decrypting unit 220a in the IC card 210a executes a content key decrypting processing. In this processing, the hashing function processing unit 222 calculates a hashing value Hash of the CRL passed from the HD-DVD player 200a in the first place (S22) . Next, the Ex-OR unit 223 carries out an exclusive OR between own device key KD__A of the IC card 210a memorized in the public key memory unit for certificate authority (CA) 231 and the hashing value Hash (S23). The Dec processing unit 224 decrypts the encrypted content key with the derived exclusive OR value, obtains the content key Kc (S24) and passes the content key Kc to the authentication unit 237, then the content key decrypting processing is finished. After the content key Kc is given, the authentication unit 237 encrypts it with the session key K (S25) and sends it to the descrambler 260 via the SAC (S26). This enables to prevent the content key Kc from wiretapping.
The authentication unit 277 in the descrambler 260 decrypts the encrypted content key received from the IC card 210a with the session key K', obtains the content key Kc (S27) and passes the content key Kc to the Dec processing unit 280. The descrambler 260 decrypts the encrypted content with the content key Kc received from the authentication unit 277 and obtains the content (S28). This enables the content to be decrypted with protecting the copyright.
Alternatively, it may be possible to replace the IC card 210a and descrambler 260 with HD-DVD player 200a, and the CRL bounded to DVD 2a with the CRL for which the self key is not revoked yet. In this case, the SAC is set as same with the above mentioned case and can go on to the cipher communication step (S21) using the session key.
In this first embodiment, the CRL and the encrypted content key ring encrypted with information associated with the hashing value Hash of the CRL are to be bounded to the DVD 2a. For this reason, when the case that the CRL is replaced, the hashing value Hash of the replaced CRL and the hashing value Hash of the CRL bound to the DVD 2a do not match in its value. As a result, it is impossible to obtain a qualified content key Kc by decrypting an encrypted content using the hashing value Hash of the replaced CRL. For obtaining the qualified content key Kc for decrypting the encrypted content, it is necessary to pass the CRL bound to the DVD 2a in return.
Accordingly, it is possible to intensify the copyright protection by eliminating the decrypting device 200a which conducts an illegal operation such as a replacement of the CRL.
(The Second Embodiment) Fig. 6 is an external view of an arrangement of the copyright protection system lb for recording medium according to the second embodiment. Now that the components of the recording medium copyright protection system lb are put the same number corresponding to those the recording medium copyright protection system la of the first embodiment, the explanation is to be omitted except the different part of the recording medium copyright protection system la.
In the terminal device 110a in the encryption device 100a according to the first embodiment, the Ex-OR unit 115 carries out the exclusive OR between the hashing value Hash of the CRL outputted from the hashing function processing unit 114 and the each device key. The Enc unit 116 encrypts a content key Kc with the exclusive OR value and generates the encrypted content key ring. On the other hand, the terminal device 110b in the encryption device 100b according to the second embodiment, the Enc unit 117 encrypts the content key Kc only with each device key memorized in the device key ring memory unit 112 and generates an encrypted content key ring encrypted only with each device key. The terminal device 110a in the encryption device 100a according to the first embodiment passes the content key Kc, without any change, to the terminal device 160. So, the terminal device 160 encrypts a content with the content key Kc and generates the encrypted content. On the other hand, the terminal device 110b in the encryption device 100b according to the second embodiment carries out the exclusive OR between the hashing value Hash of the CRL outputted from the hashing processing unit 114 and the content key Kc in the Ex-OR unit 118 and passes it to the terminal device 160. As a result, the terminal device 160 is received the exclusive OR value encrypts the content with the exclusive OR value and generates the encrypted content in the Enc unit 162. Accordingly, there are no hashing values Hash associated with the each encrypted content key bound to the DVD2b but the encrypted content is associated with the hashing value Hash. This is a reverse case with the DVD 2a. The content key decrypting unit 220a in the decrypting device 200a according to the first embodiment calculates the exclusive OR between the self device key KD_A memorized in the device key memory unit 221 in the Ex-OR unit 223 and the hashing value Hash of the CRL. The Dec processing unit 224 decrypts the encrypted content on which the hashing value Hash is associated, with the exclusive OR value and obtains the content key Kc.
On the other hand, the content key decrypting unit 220b in the decrypting device 200b according to the second embodiment decrypts the encrypted content key only with the self device key memorized in the device key memory unit 221 in the Dec processing unit 225 because the hashing value Hash isn't associated with the encrypted content key bound to the DVD2b and obtains the content key Kc. Since the encrypted content bound to the DVD2b is associated with the hashing value Hash, the Ex-OR unit 226 carries out the exclusive OR between the content key Kc obtained from the Dec processing unit 225 and the hashing value Hash of the CRL calculated in the hashing function processing unit 222 and passes the obtained exclusive OR value to the authentication unit 237 in the authentication processing unit 230a. The exclusive OR value between the content key Kc and the hashing value Hash is passed from the authentication unit 237 to the Dec processing unit 280 via the SAC and the authentication unit 277 in the descramble 260. The Dec processing unit 280 obtains a content by decrypting the encrypted content associated with the hashing value Hash which is recorded on the DVD2b with the exclusive OR between the content key and the hashing value Hash.
Accordingly, in the recording medium copyright protection system lb according to the second embodiment, it is necessary to pass the CRL bound to the DVD 2a to obtain a key for decrypting the content in return, as is the same case with the first embodiment. As a result, it is possible to intensify the copyright protection by eliminating the decrypting device 200b which conducts an illegal operation such as a replacement of the CRL.
(The Third Embodiment)
Fig. 7 is a functional block diagram that shows an overall configuration of the recording medium copyright protection system lc according to the third embodiment. In this figure, functional parts corresponding to the recording medium copyright protection system la according to the first embodiment are not shown, and only the part specific to the recording medium copyright protection system lc is shown .
The IC card 210a in the decrypting device 200c according to the first embodiment simply passes the obtained content key Kc to the descrambler 260b. In this way, it is impossible for the IC card 210a itself to know whether the obtained key is a qualified key that can decrypt the encrypted content, normally or not. Accordingly, it is desirable to pre-check that the content key Kc has the right value or not before passing the obtained content key Kc to the descrambler 260.
Accordingly, the copyright protection system for a recording medium lc according to the third embodiment is a system that having a key checking function. The terminal device 110c, used by the copyright protection licensor of the encryption device 100c, has a fixed-pattern memory unit 119 besides the componentry of the terminal device 110a. The fixed-pattern memory unit 119 memorizes a predetermined fixed-pattern plaintext (i.e. fixed-pattern plaintext indicated in hex "0123456789ABCDEF") which is encrypted with the content key Kc in advance. This fixed-pattern memorized in the fixed-pattern memory unit 119 is bound to the DVD2c via the terminal device 160.
The content key decrypting unit 220c set in the IC card 210c in the decrypting device 200c includes a Dec processing unit 227 and a content decrypting key checking unit 228 besides the componentry of the content key decrypting unit 220a. The Dec processing unit 227 decrypts the encrypted data of the fixed-pattern plaintext bound to the DVD 2a with the content key Kc decrypted by the Dec processing unit 224. The content decrypting key checking unit 228 pre-holds the above-mentioned fixed-pattern plaintext Λ0123456789ABCDEF' and checks whether the decrypting key Kc has a right value or not by checking the pre-hold fixed-pattern plaintext and the fixed-pattern plaintext decrypted by the Dec processing unit 227 are the same value or not. In accordance with the recording medium copyright protection system lc, it is possible to check whether the content key Kc has the right value or not within the IC card 210c in advance. And it is avoidable to execute the decrypting processing with a wrong content key Kc in the descrambler 260. In the recording medium copyright protection system lc according to the third embodiment, although the key checking function is applied to the recording medium copyright protection system la according to the first embodiment, the key checking function may also be applicable to the recording medium copyright protection system lb according to the second embodiment.
In such a case, since the content is encrypted with the exclusive OR between the content key Kc and the hashing value Hash of the CRL, the fixed-pattern memory unit 119 memorizes an encrypted fixed-pattern plaintext Λ0123456789ABCDEF' with the exclusive OR between the content key Kc and the hashing value Hash as a fixed-pattern in advance, and records it on the DVD2c. The Dec processing unit 227 in the content key decrypting unit 220c outputs the Dec processing unit 224, that is, outputs the Ex-OR unit 226 (refer to Fig.6) in place of the content key KC, that is, decrypts the encrypted data of the fixed-pattern plaintext bound to DVD 2a with the exclusive OR between the content key Kc and the hashing value Hash. The content decrypting key checking unit 228 is able to check whether the key for decrypting the decrypted content is a qualified key or not, in other words, the exclusive OR between the content key Kc and the hashing value Hash is a right value or not by checking whether the pre-holding fixed-pattern plaintext 0123456789ABCDEF' and the fixed-pattern plaintext decrypted in the Dec 227 are the same value or not.
(The Forth Embodiment)
Fig.8 is a functional block diagram that shows an overall configuration of the recording medium copyright protection system Id according to the forth embodiment. In this figure also, the functional parts corresponding to the recording medium copyright protection system la according to the first embodiment are not shown and only the part specific to the recording medium copyright protection system Id is shown.
The recording medium copyright protection system Id according to the forth embodiment is a system that has a key checking function as same with the recording medium copyright protection system lc. The terminal device llOd in the encryption device lOOd includes an Enc unit 131 besides the componentry of the terminal device 110a. The Enc unit 131 generates a content key reference data encrypted with the content key Kc read out from the content key memory unit 113. The content key reference data is bound to the DVD2d. On the other hand, the content key decrypting unit 220d set in the IC card 210d in the decrypting device 200d includes an Enc unit 241 and a content key checking unit 242 besides componentry of the content key decrypting unit 220a. The Enc unit 241, as is the same construction with the Enc unit 131 in the terminal device l lOd, encrypts the content key decrypted in the Dec processing unit 224 with the content key Kc and generates the content key reference data. The content key checking unit 242 matches up the content key reference data generated in the Enc unit 241 with the content key reference data bound to the DVD2d and checks if both data have the same value by checking whether the content key Kc decrypted by the Dec processing unit 224 is the qualified key or not, that is, the key can be used for decrypting the encrypted content or not.
As stated above, in accordance with the recording medium copyright protection system Id, it is possible to check whether the content key Kc has the right value or not within the IC card 210d in advance as same with the recording medium copyright protection system ic. And it is avoidable to execute the decrypting processing with a wrong content key Kc in the descrambler 260.
In the recording medium copyright protection system Id according to the forth embodiment, although the key checking function is applied to the recording medium copyright protection system la according to the first embodiment, the key checking function may also be applicable to the recording medium copyright protection system lb according to the second embodiment.
In such a case, since the content is encrypted with the exclusive OR between the content key Kc and the hashing value Hash of the CRL, the Enc unit 131 outputs the content key memory unit 113, that is, outputs the Ex-OR unit 118 in place of the content key KC, that is, decrypts the encrypted data of the fixed-pattern plaintext bound to DVD 2a with the exclusive OR between the content key Kc and the hashing value Hash and records it as a content key reference data on the DVD2c.
On the other hand, the Enc unit 241 in the content key decrypting unit 220d outputs the Dec processing unit 224, that is, outputs the Ex-OR unit 226 (refer to Fig.6) in place of the content key KC, that is, encrypts the exclusive OR value between the content key Kc and the hashing value Hash with the exclusive OR value. The content key checking unit 242 checks whether the key generated in the Ex-OR unit 226 is the qualified key for decrypting the encrypted content or not by comparing the content key reference data generated in the Enc unit 241 and the content key reference data bound to the DVD2d.
(The Fifth Embodiment)
Fig.9 is a functional block diagram that shows an overall configuration of the recording medium copyright protection system le according to the fifth embodiment. In this figure also, the functional parts corresponding to the recording medium copyright protection system la according to the first embodiment are not shown, and only the part specific to the recording medium copyright protection system le is shown.
The recording medium copyright protection system le according to the fifth embodiment is a system that has a key checking function as same with the recording medium copyright protection systems lc and Id, and its component is as same with the encryption device lOOd according to the forth embodiment. The content key reference data generated from the Enc unit 131 is bound to the DVD2d. The content key decrypting unit 220e set in the IC card 210e of the decrypting device 200e which includes a Dec processing unit 243 and a content key checking unit 244 besides the componentry of the content key decrypting unit 220a . The Dec processing unit 243 is encrypted in the Enc unit 131 as stated above and decrypts the content key reference data bound to DVD2d with the content key Kc decrypted in the Dec processing unit 224. The content key checking unit 244 which matches up the content key Kc decrypted in the Dec processing unit 224 with the content key Kc decrypted in the Dec processing unit 243, and checks if both keys have the same value by checking the content key Kc decrypted by the Dec processing unit 224 is the qualified key or not, that is, whether the key can be used for decrypting the encrypted content or not.
As stated above, in accordance with the recording medium copyright protection system le, it is possible to check whether the content key Kc has the right value or not within the IC card 210d in advance as same with the recording medium copyright protection systems lc and Id . And it is avoidable to execute useless decrypting processing using a wrong content key Kc in the descrambler 260.
In the recording medium copyright protection system le according to the fifth embodiment, although the key checking function is applied to the recording medium copyright protection system la according to the first embodiment, the key checking function may also be applicable to the recording medium copyright protection system lb according to the second embodiment.
In such a case, since the content is encrypted with the exclusive OR between the content key Kc and the hashing value Hash of the CRL, as is the same with the forth embodiment, the Enc unit 131 outputs the content key memory unit 113, that is, outputs the Ex-OR unit 118 in place of the content key KC, that is, decrypts the encrypted data of the fixed-pattern plaintext bound to DVD 2a with the exclusive OR of the content key Kc and the hashing value
Hash and records it as a content key reference data to the DVD2c.
On the other hand, the Dec processing unit 243 in the content key decrypting unit 220e outputs the content key decrypting data read from the DVD2c to the Dec processing unit 224, that is, outputs the Ex-OR unit 226 (refer to Fig.6) in place of the content key KC, that is, decrypts with the exclusive OR value between the content key Kc and the hashing value Hash. The content key checking unit 244 checks whether the key generated in the Ex-OR unit 226 is the qualified key that can decrypt an encrypted key or not, that is, compares the exclusive OR value between the content key Kc and the hashing value Hash with the key decrypted by the Dec processing unit 243 and checks the two values match or not .
(The Sixth Embodiment)
Fig .10 is a functional block diagram that shows an overall configuration of the recording medium copyright protection system according to the sixth embodiment. In the recording medium copyright protection systems la to le, as stated-above, the CRL checking unit 235 checks the CRL bound to the DVD and judges whether the communication partner (descrambler 260) is revoked or not. With this check, however, it is impossible to revoke the descrambler 260 when the public key certificate of the communication partner (descrambler 260) is revoked after updating the CRL if the time of the production of the DVD is well before, that is, the CRL bound to the DVD is old. For this reason, it is necessary to make judgment whether the communication partner (descrambler 260) is revoked or not using a CRL as the latest possible.
Therefore, the recording medium copyright protection system If according to the sixth embodiment has a latest edition CRL memory processing unit 239 besides the componentry of the authentication processing unit 230a in the authentication processing unit 230b in the IC card 210f in the decrypting device 200f.
The latest edition CRL memory processing unit 239 is a processing unit operable to memorize a latest edition CRL which is extracted from the CRL received hitherto and hold it in the decrypting device 200f. The processing unit includes a latest edition detecting processing unit 2391, a latest edition detecting information memory unit 2392 and a memory unit 2393.
The latest edition detecting processing unit 2391 conducts a verification processing whether the CRL is the latest or not with every receiving of the CRL bound to the DVD 2a. The latest edition detecting information memory unit 2392 memorizes the latest edition detecting information of the CRL (i.e. file size of the list) held by the decrypting device 200f.
The memory unit 2393 memorizes the hashing value Hash (i.e. l28bit) of the CRL held by the decrypting device 200f. The reason for that is, when a large size of the CRL is memorized and held in the IC card 210f inside, the cost effectiveness for the IC card 210f will become high. That is, in this embodiment, a latest edition CRL memory unit 250 is installed outside of the IC card 210f (and inside of the decrypting device 200f) and memorizes a latest edition CRL so as to memorize/hold only the hashing value Hash of the list in the memory unit 2393 of the IC card 210f inside. When the CRL checking unit 235 checks whether the communication partner is a revoked device or not, the latest edition CRL is read out to the IC card 210f and checks it with the hashing value Hash. More specifically, when a new CRL bound to the DVD 2a is received, the latest edition detecting processing unit 2391 executes the verification processing whether the CRL is a latest edition or not as a mid-processing of holding (or not holding) a CRL as shown in the flow chart of Fig . 11A. That is, the latest edition detecting processing unit 2391 compares a file size which is recoded in a header of the CRL bound to the DVD 2a with a size memorized in the latest edition detecting information memory unit 2392 (S101). This comparison is made on the basis of the characteristic of the CRL that the revoked computers increase monotonously and the file size becomes large as the time goes by.
As a result, when the file size of the CRL bound to the DVD 2a is larger ("YES" in S101) than the previous one, that is, when the CRL read out from the DVD 2a at the present moment is the latest, the file size of the latest edition is to be updated by storing (overwriting) the list in the latest edition detecting information memory unit 2392 (S102). The latest edition detecting processing unit 2391 calculates a hashing value Hash of a latest edition list, stores the hashing value Hash in the memory unit 2393 (S103), stores the latest edition list in a latest edition CRL memory unit 250 (S104), and transfers the latest edition list to the CRL checking unit 235 (S105). Thus the confirmation verification processing ends.
On the other hand, when the file size of the CRL bound to the
DVD 2a is not larger ("NO" in S101) than the previous one, that is, the CRL which is read out from the DVD 2a at the present moment is not the latest, then the latest edition detecting processing unit 2391 ends the confirmation verification processing immediately. When it is necessary to have a latest CRL, a processing of reading out the latest CRL is executed, as shown in Fig. l lB.
In that reading-out processing, the latest edition detecting processing unit 2391 reads out the latest edition list from the outside of the memory unit, that is, the latest edition CRL memory unit 250 (Sill), calculates the hashing value Hash of the latest edition list (S112), and verifies whether the calculated hashing value Hash matches the hashing value Hash memorized in the memory unit 2393 (S113) . This verification is conducted for detecting whether a replacement is carried out or not. When it has been not carried out, the two hashing values Hash match.
When the hashing value Hash matches (Υes' in S113), the latest edition detecting processing unit 2391 transfers the latest edition list read out from the CRL latest edition list memory unit 250 to the CRL checking unit 235 (S114) and ends the latest edition list reading-out processing. On the other hand, when the two hashing values Hash don't match (λNO' in S113), the latest edition detecting processing unit 2391 stops the processing (S115) and ends the reading-out processing . When the case that the latest CRL is not read out because of the mismatch of the two hashing value Hash, the latest edition detecting processing unit 2391 assumes that some unauthorized use was conducted, and terminates all the processing (rejects an authentication of the partner computer) after the processing of using the CRL.
As a result, in accordance with the copyright protection system for the recording medium If of the sixth embodiment, the latest list within the read out CRL from the DVD 2a is held in the latest edition CRL memory unit 250 and be used . Thus, it is avoidable to authenticate a partner device using the old CRL.
Additionally, the file size is used in a way for confirming the latest edition list according to the sixth embodiment, however, a numbers of the certificate (the serial entry number) registered in the CRL may also be used for this confirmation processing.
An explanation for an example where the decrypting devices 200a to 200f for the recording medium according to the embodiment of the copyright protection system for the present invention are applied to the HD-DVD player is made with reference to figures.
Reference is now made to Fig . 12 which illustrates an external view of an arrangement of the HD-DVD player which includes the decrypting devices 200a to 200f for the recording medium according to the embodiment of the present invention . The HD-DVD player 200 is a system that plays back a content
(i.e. movies) recorded on the DVD 2a to 2d using the IC card 210a to 210f. It comprises of a card inserter 2100 that the IC card 210a to 210f are to be inserted, a DVD-ROM drive 2200 that plays back the DVD 2a to 2d, and the descrambler 260 that is implemented inside of the HD-DVD player 200.
In addition, the IC card 210a, to 210f is a plastic card, that the IC tip, including CPU, is embedded and a card which is able to verify whether an access is the qualified access or not when reading out the data. As a result of this, it is very hard for an outsider to conduct an unauthorized use or to tamper, thus, the high security is guaranteed .
For applying the encryption device according to the present invention to an image-playback system, the digital production recorded on the DVD 2a to 2d can be protected from illegal copying. The development of the present invention in the multimedia related products circulation market is to be prospected.
(The Seventh Embodiment)
Reference is now made to Fig . 13 which illustrates a functional block diagram that shows an overall configuration of the recording medium copyright protection system lg according to the seventh embodiment. Now that the functional elements of the recording medium copyright protection system lg are put the same numbers corresponding to those of the recording medium copyright protection system la of the first embodiment. The explanation is to be omitted except the different part of the recording medium copyright protection system la .
The encryption device 100a according to the first embodiment stores two keys, the device key ring KD_A and the content key Kc to the device key ring memory unit 112 and the content key memory unit 113, respectively. Then the content key Kc is encrypted with the device key ring KD_A with which the hashing value Hash of the CRL is associated and generates the encrypted content key. That is, the encryption device is double layered with the device key KD_A and the content key Kc. This construction usually makes the encryption intensify against an attack. However, there are licensors who want to further intensify the encryption. Therefore, the terminal device llOe in the encryption device lOOe according to the seventh embodiment further intensifies the encryption by adopting an triple layered construction, with the device key KD_A, the content key Kc, as mentioned-above, and a disk key Kd .
In other words, the terminal device l lOe in the encryption device lOOe includes a hashing function processing unit 114 that memorizes the disk key Kd, and an Enc unit 142, 143 besides the CRL memory unit 111, the device key ring memory unit 112, content key memory unit 113, the hashing function processing unit 114 and the Ex-OR unit 115. In addition, this disk key Kd is located in the upper layer of the DVD with considering that the DVD records a plurality of content (approx.7).
The Enc unit 142 encrypts the disk key Kd memorized in the disk key memory unit 141 with the exclusive OR between the hashing value Hash and the each device key KD_A and generates an encrypted disk key ring.
The Enc unit 143 encrypts the content key Kc memorized in the content key memory unit 113 with the disk key Kd and generates the encrypted content key.
As a result, the terminal device 160 binds the encrypted content, the CRL, the encrypted disk key ring generated by the Enc unit 142,143 and the encrypted content key, to the DVD2e.
In response to above, the content key decrypting unit 220f in the IC card 210g which is in the decrypting device 220f memorizes only the device key KD_A and decrypts the disk key Kd by decrypting the encrypted disc key ring bound to the DVD2e with the device key KD_A and the hashing value Hash of the CRL. Furthermore, it decrypts the content key Kc by decrypting the encrypted content key bound to DVD2e with the disk key Kd.
In other words, the content key decrypting unit 220f includes Dec processing unit 245 and 246 besides the device key memory unit 221, the hashing function processing unit 222 and the Ex-OR unit 223. The Dec processing unit 245 decrypts the disk key Kd by decrypting the encrypted disk key ring passed by the descrambler 260 with the hashing value Hash of the device key KD_A and the hashing value Hash of the CRL. The Dec processing unit 246 decrypts the content key Kc by decrypting the encrypted content key passed from the descrambler 260 with the disk key Kd.
Accordingly, the recording medium copyright protection system lg according to the seventh embodiment, as same case with the first embodiment, should give the CRL bound to the DVD2e for obtaining the key for decrypting the content in return. This enables not only to eliminate the illegal descrambler 260 that conducts a replacement of the CRL, but also to intensify the copyright protection further, because the secret key is triple layered. As a result, the encryption intensity increases against an attack.
Additionally, although the secret key is triple layered in this embodiment, it may be possible for it to be multilayered. In that case, the encryption intensity becomes higher against an attack. Also, the terminal device l lOe may possibly include further a confirmation data outputting unit that outputs the confirmation data which is to be a criterion for verifying whether the decrypted content key is the qualified key or not in the decrypting device 200k, to the DVD2e. In this confirmation data outputting unit may function as outputting a data obtained by encrypting the predetermined fixed-pattern data with the content key memorized in the content key memory unit 113 as a confirmation data to the DVD2e. Also, in correspond to the terminal device l lOe, the content key decrypting unit 220f may include a content decrypting key checking unit 228, a content key checking unit 242 and a content decrypting key checking unit 244 to verify whether the decrypted content key is the qualified key or not. (The Eighth Embodiment)
Reference is now made to Fig. 14 which illustrates an external view of an arrangement of a recording medium copyright protection system Ih according to the eighth embodiment. Now that the functional elements of the recording medium copyright protection system lh are put the same numbers corresponding to those of the recording medium copyright protection system lg of the seventh embodiment. The explanation is to be omitted except the different part of the recording medium copyright protection system lg. The terminal device llOe in the encryption device lOOe according to the seventh embodiment encrypts the disk key Kd memorized in the disk key memory unit 141 with the exclusive OR value between the hashing value Hash and the each device key KD_A, and generates the encrypted disk key ring, along with that, encrypts the content key memorized in the content key memory unit 113 with the disk key Kd and generates the encrypted content key. As a result, the terminal device l lOe increases the encryption intensity against an attack, however a load for the two decrypting processing becomes high. In the content key decrypting unit 220f also, a load for the two decrypting processing becomes high.
Therefore, the terminal device llOf in the encryption device lOOf according to the recording medium copyright protection system lh reduces the load by cutting out a processing of encrypting the content key Kc by using a medium ID memory unit 144 to memorize the medium ID and a MID that specific to every DVD, in place of the content key memory unit 113 and a one-way function unit 145 that generates a content key Kc based on the medium ID, and the MID in place of the Enc unit 143.
In other words, the terminal device llOf in the encryption device lOOf further includes the medium ID memory unit 144 and the one-way function unit 145 besides the CRL memory unit 111, the device key ring memory unit 112, the hashing function processing unit 114, the Ex-OR unit 115, the disc key memory unit 141 and the Enc unit 142.
The one-way function unit 145 (i.e. Ex-OR) generates a content key Kc by inputting a medium ID memorized in the medium ID memory unit 144, a MID and a disk key Kd into the one-way function. The load of the processing of generating the content key Kc is much lighter than that of the processing of generating the encrypted content key in the Enc unit 143, shown in Fig.13.
The terminal device 160 binds an encrypted disk key ring generated by the Enc unit 142, a medium ID outputted by the medium ID memory unit 144 and a MID, besides the CRL and the encrypted content, to the DVD2f.
On the other hand, the content key decrypting unit 220g in the
IC card 210h of the decrypting device 200h memorizes only the device key ,KD_A, decrypts the disk key Kd by decrypting an encrypted disk key ring bound to the DVD2e and the hashing value
Hash of the CRL and generates the content key Kc based on the medium ID, the MID and the disk key Kd which are bound to DVD2e.
In other words, the content key decrypting unit 220g further includes a one-way function unit 247, the same construction with the unit 145, besides the device key memory unit 221, the hashing function processing unit 222, the Ex-OR unit 223 and the Dec processing unit 245.
The one-way function unit 247 generates the content key Kc by processing the medium ID and the MID put into the one-way function unit 247 with the disk key Kd. A load for this content key
Kc generating processing is lighter than that of the content key decrypting processing in the Dec processing unit 246 of Fig .13.
It is easy for the medium ID and the MID to be known because they are bound to the DVD2f, however, the construction of the one-way function unit 145 and 247 is hard to be known, as is the same case with the secret key. Accordingly, because the recording medium copyright protection system lh according to the eighth embodiment should pass the CRL bound to the DVD 2a for getting a key for decrypting content in return, same as the first embodiment, this enables to eliminate the descrambler 260 which conducts an unauthorized use such as a replacement of the CRL, and increase the encryption intensity against an attack. Thus the encryption intensity further increases for the copyright protection and reduces the load for the terminal device l lOf and the content key decrypting unit 220g. In addition, the terminal device l lOf may further include a confirmation data outputting unit to output the confirmation data to the DVD2f. The confirmation data is to be a criterion for confirming whether a content key decrypted in the decrypting device 200h is the qualified key or not. The confirmation data outputting unit may also encrypt the predetermined fixed-pattern data with the content key memorized in the content key memory unit 113 and output it as a confirmation data . Also, the confirmation data outputting unit may output a data obtained by encrypting the content key with the content key as a confirmation data, to the DVD2f. In response to the terminal device llOf, the content key decrypting unit 220f may include a content decrypting key checking unit 228, a content key checking unit 242, and a content decrypting key checking unit 244.
(The Ninth Embodiment) Reference is now made to Fig. 15 which illustrates a functional block diagram that shows an overall configuration of the recording medium copyright protection system li according to the ninth embodiment. Now that the functional elements of the recording medium copyright protection system li is put the same number corresponding to those of the recording medium copyright protection system la of the first embodiment. The explanation is to be omitted except the different part of the recording medium copyright protection system la.
By the way, it is also necessary for a DVD medium to have a copyright protection, as is the same case with the HD-DVD, because the DVD is very high for its affinity with a personal computer (PC). As a result, the DVD can be read out in a personal computer (PC). When the DVD drive is mounted to the PC, at the same time, the PC installs the playback software in the hard disk so as to view a content using the PC as a decrypting device, as is the same case with the DVD-HD. The decrypting device 200a includes the IC card 210a and the descrambler 260 according to the first embodiment, however, the decrypting device for PC generally includes the DVD drive and the playback software.
Therefore, the decrypting device 200i comprises of a DVD drive 400 which includes the descrambler 260 and the authentication processing unit 270, and a DVD playback PC software 500 which includes the IC card 210a and the Dec processing unit 280 in the descrambler 260. For further information, the manufacturer for the DVD drive 400 is different from its DVD playback PC software 500.
The DVD drive 400 is the same construction with the authentication processing unit 270. The DVD drive 400 includes a public key certificate memory unit for the bus authentication 410, a secret key memory unit for a bus authentication 420, a public key decrypting unit 430, a key calculating unit 440 and a bus encryption unit 450.
The public key certificate memory unit for the bus authentication 410 in the DVD drive 400 memorizes a public key certificate for the bus authentication such as an IDE bus and a SCSI bus in advance, and passes the public key certificate for the bus authentication to the DVD playback PC software 500 when the DVD 2a plays back content. The secret key memory unit for the bus authentication 420, the public key decrypting unit 430, the key calculating unit 440 and the bus encryption unit 450 generate a session key K and form a SAC between the DVD playback PC software 500. The DVD playback software 500 includes a certificate qualification checking unit 510, a public key validity checking unit 520, a public key encryption unit 530, a verification unit 540, a key calculating unit 550, a bus decrypting unit 560, a hashing function processing unit 570, a device key memory unit 580, and a Dec processing unit 590, 595. The above each unit is implemented in a software, a CPU in the PC and a memory, etc.
The certificate qualification checking unit 510 checks whether the certificate is qualified or not by decrypting the certificate sent from the public key certificate memory unit for the bus authentication 410 with the public key.
The public key validity checking unit 520, upon receipt of the notice from the certificate qualification checking unit 510 that the certificate is qualified, checks whether the DVD drive is revoked or not with reference to the CRL for the bus authentication received via the DVD drive 400 and the latest CRL for the bus authentication which read out from the latest edition CRL memory unit 250.
When the public key encryption unit 530, the verification unit 540, the key calculating unit 550, and the bus decrypting unit 560 receive the notice from the public key validity checking unit 520 that the DVD drive 400 is not revoked, that is, the DVD drive 400 is qualified, a session key K' is generated, and the SAC is formed between the DVD drive 400.
The public key encryption unit 530 calculates a hashing value Hash of the CRL. The device key memory unit 580 memorizes the device key
KD_A in advance.
The Dec processing unit 590 generates a content key Kc based on the encrypted content key outputted from the bus decrypting unit 560, the hashing value Hash outputted from the hashing function processing unit 570 and the device key kD_A.
The Dec processing unit 590 generates a content by decrypting the encrypted content bound to the DVD 2a with the content key Kc. Here is an explanation for the authentication processing executed between the DVD drive 400 and the DVD playback PC software 500.
The public key encryption unit 530 generates a random number cha upon receipt of the notice that the DVD drive is qualified, encrypts the generated random number cha with the partner public key for the bus authentication and transfers the encrypted random number cha to the public key decrypting unit 430.
The public key decrypting unit 430 obtains the random number cha by decrypting the encrypted random number cha with the secret key for the bus authentication memorized in the secret key memory unit for the bus authentication memory unit 420. The public key decrypting unit 430 encrypts the random number cha and the self secret key with the partner public key for the bus authentication, transfers the result of the encryption to the verification unit 540 and passes the random number cha and the secret key to the key calculating unit 440. The key calculating unit 440 calculates the session key K based on the random number cha and the secret key and passes it to the bus encryption unit 450. The bus encryption unit 450 encrypts the encrypted content key ring and sends the doubly encrypted content key ring to the DVD playback PC software 500.
On one hand, the verification unit 540 in the DVD playback PC software 500 verifies whether the random number cha obtained by decrypting with the self secret key matches the original random number cha or not, and when they match each other, the random number cha and the partner secret key are passed to the key calculating unit 550. The key calculating unit 550 calculates the session key K' using the random number cha and the partner secret key and passes to the bus decrypting unit 560. The bus decrypting unit 560 decrypts the doubly encrypted content key ring with the session key K', generates the encrypted content key ring and outputs the encrypted content key ring to the Dec processing unit 590.
On the other hand, the hashing function processing unit 570 calculates the hashing value Hash of the CRL outputted from the DVD drive and outputs the hashing value Hash to the Dec processing unit 590. The Dec processing unit 590 decrypts the content key to the encrypted value with the device key KD_A by calculating the exclusive OR between the encrypted content key ring and the hashing value Hash, and further decrypts the content key Kc by decrypting the device key KD_A and passes it to the Dec processing unit 595. The Dec processing unit 595 decrypts the encrypted content bound to the DVD 2a with the content key Kc and plays back the content.
Accordingly, the decrypting device 200i of the recording medium copyright protection system li according to the ninth embodiment, that is, the PC including the DVD drive 400 and the DVD playback PC software 500 should pass the CRL bound to the DVD 2a for getting a key for decrypting a content in return, as is the same case with the HD-DVD. As a result, it enables for the computers to eliminate an illegal descrambler 260 which conducts an unauthorized use such as a replacement of the CRL and the copyright is thus protected .
In addition, the decrypting device 200i, that is, when the case that a PC is connected to Internet, the decrypting device 200i accesses the terminal device 300 when the DVD2e plays back, downloads the latest CRL from the terminal device 300 and checks whether the DVD drive 400 is revoked or not in the public key validity checking unit 520 using the downloaded latest CRL.
The decrypting device 200i according to the ninth embodiment includes the DVD drive 400 and the DVD playback software 500, however, the DVD playback PC software only has, what we call, a "descramble" function. So, in this case, it is assumed that the decrypting device 200i should be used with connecting to the licensor supply protection module A. In other words, the PC should be fixable for the IC card 210a and the decrypting device 200i, and the DVD drive 400 may be included in the IC card 210a and the DVD playback PC software partially in the Dec processing unit in this PC.
In that case, the content may be played back by decrypting the encrypted content read out from the DVD drive 400 after setting the SAC between the DVD drive 400 and the IC card 210a, and between the IC card 210a and the Dec processing unit 595 in the DVD playback PC software.
In addition, the encryption device 100a may further include the confirmation data outputting unit to output the confirmation data, which is to be a criterion for confirming that the content key decrypted in the decrypting device 200i is the qualified key or not, to the DVD 2a. When the case that the confirmation data outputting unit functions as of outputting data as a confirmation data to the DVD2f and the data which is obtained by encrypting the predetermined fixed-pattern data with the content key memorized in the content key memory unit 113 or the case of outputting data as a confirmation data to the DVD2f and the data which is obtained by encrypting the content key with the content key, in corresponding to the terminal device 110a, the content key decrypting unit 220i includes the content decrypting key checking unit 228 that checks whether the content key is the qualified key or not, the content key checking unit 242, and the content decrypting key checking unit 244.
The copyright protection system for the present invention according to the embodiments is explained above. However, the present invention is not limited to those embodiments.
For example, in the above embodiment for the copyright protection system, the digital production is transmitted via the DVD medium, however, a system for transmitting the digital production via the transmission medium such as Internet is applicable to the present invention. In other words, it is applicable for a system by replacing the way of "recording to the record medium" to "sending to the transmission line", and "reading out from the recording medium" to "receiving from the transmission line", to the present invention.
In addition, the present invention is applicable for a system that transfers the digital production by combining a recording medium and a transmission medium. That is, an encrypted content may well be supplied by a recording medium such as DVD, and a key for decrypting the encrypted content and a CRL are supplied by a transmission medium, the network delivery. The reverse case, a key is to be supplied by the recording medium, and an encrypted content is to be supplied by a transmission medium, the network delivery, is also applicable. In this system that transfers the digital production by combining of the recording medium and the transmission medium, it is selectable what can be supplied by the recording medium within the encrypted contents and the keys, and what can be supplied by the transmission medium, the network delivery. In the above embodiment, the copyright protection module
(tamper tolerant module) is applied to the IC card 210a to 210f, however, a LSI 210i which integrates each configuration of IC card 210a to 210f to one chip can be applied and the LSI 210i may well be mounted to a socket 210j or mounted by soldering on to a board. Also, in the above embodiment, the IC card 210a to 210f is supplied by the copyright protection licensor, however, the IC card 210a to 210f manufactured by the manufacturer of the decrypting device 200a to 200f or the LSI 210i can be used in place of the IC card 210a to 21 Of.
Also, in the above embodiment, the copyright protection system according to the present invention is applied to a wide area between the encryption device 100a to lOOf of the copyright protection licensor or the content manufacturer and the decrypting device 200a to 200f used by the user, however, the system is also applicable to a small area, such as domestic area or to the intranet when a processing of the cipher communication is executed.
(The Tenth Embodiment)
Fig . 17 is a block diagram that shows an overall configuration copyright protection system which establishes a cipher communication with the content via home LAN, and Fig. 18 is a block diagram that shows a construction of an AV server lOOj, each plasma TV 200k, a VTR 200m, and a DVD recorder 200n of Fig. 17 and Fig. 18. In Fig. 18, since the construction of the plasma TV 200k, the VTR 200m, and the DVD recorder 200n are the same with the copyright protection system, only the plasma TV 200k is shown as an example.
The copyright protection system lj includes a home LAN 30 as a transmission medium, an AV server lOOj which connects to the home LAN 30, a plasma TV 200k as a client, a VTR 200m and a DVD recorder 200n. Although the AV server lOOj has almost same components with the encryption device 100a as shown in Fig . 1, the AV server lOOj stores the content received from out-of-home in the content memory unit 161 which includes a HDD and delivers the content by request of the memorized content delivery via the home LAN 30. This is the different point.
More specifically, the AV server lOOj receives content from a broadcast station lOOg via a broadcast (BS, CS) or broadcast network of a terrestrial broadcast 3a, from a server lOOh of a content provider via internet network 3b, or from a CATV broadcast lOOi via CATV network 3c, and memorizes the content to the content memory unit 161. The AV server lOOj includes a session key memory unit 112a.
When delivering request of the content memorized in the content memory unit 161 from a client such as the plasma TV 200k is received, a SAC is formed between the plasma TV 200k based on the delivering request. A session key Kses, obtained when the SAC is formed, is memorized in the session key memory unit 112a and encrypts the content key Kc with the session key Kses in place of the device key used in the encryption device 100a . The encryption device 100a encrypts the content key Kc with the device key, that is, the session key Kses is used in place of the device key. This is the different point from the encryption device 100a.
On the other hand, the plasma TV 200k, the VTR 200m and the DVD recorder 200n are almost the same components with the decrypting device 200a as shown in Fig . 1, however, the plasma TV 200k, the VTR 200m and the DVD recorder 200n each include a session key memory unit 221a for memorizing a session key obtained when the SAC is formed between the AV server lOOj, and decrypt the content key Kc with the session key Kses memorized in the session key memory unit 221a. This is the different point with the decrypting device 200a which decrypts the content key Kc with the device key KD_A.
A processing between the AV server lOOj and the plasma TV 200k according to the copyright protection system lj is to be described below with focusing on the different point with the copyright protection system la. The AV server lOOj conducts a SAC processing between the plasma TV 200k using an Elliptical Curve Cryptography (ECC) by request of the content delivery from a client, the DVD recorder 200n . The AV server lOOj and the plasma TV 200k hold the same value session key Kses each other. The AV server lOOj memorizes the session key Kses in the session key memory unit 112a. The content key decrypting unit 220h in the copyright protection module 210k of the plasma TV 200k memorizes session key Kses to the session key memory unit 221a. The Ex-OR unit 115 in the AV server lOOj carries out the exclusive OR between the session key Kses which is shared between the plasma TV 200k and the hashing value of the CRL. The Enc unit 116 encrypts the content key Kc with a value obtained by the Ex-OR unit as a key. The Enc unit 162 encrypts a content which is a requested AV data with the content key. After finished the encryption of the content key and the content, the AV server lOOj sends the encrypted content key,the encrypted content and the CRL to the plasma TV 200k via the home LAN 30. The copyright protection module 210k in the plasma TV 200k receives the CRL and the encrypted content which has been sent via the home LAN 30. The descrambler 260 receives the CRL and the encrypted content. The Ex-OR unit 223 in the content key decrypting unit 220h which is in the copyright protection module 210k of the plasma TV 200k carries out the exclusive OR between the session key Kses memorized in the session key memory unit 221a and the hashing value of the CRL obtained by the hashing function processing unit 222. The Dec processing unit 224 decrypts the content key with a value obtained in the Ex-OR unit 223 as a key. A SAC processing is conducted between the copyright protection module 210k in the plasma TV 200k and the descrambler 260 based on the CRL and the session key KK is shared .
The authentication unit 237 in the copyright protection module 210k encrypts the content key Kc with the shared session key KK and sends the content key Kc to the descrambler 260. The authentication unit 277 in the descrambler 260 decrypts the content key Kc. The Dec processing unit 280 decrypts the encrypted content with the obtained content key Kc.
Accordingly, it is easy to use the content for a client who uses a computer connected to a relatively small-scale network, such as domestic network or intranet. Furthermore, the copyright protection is strictly controlled on to the end user.
Also, in the tenth embodiment, the session key Kses is used in place of the device key, however, a secret key Ks can be shared between the AV server lOOj and the plasma TV 200k in advance, and be used in place of the session key. For checking up whether the decrypted content key is the qualified key or not, predetermined fixed pattern data described above can be sent with the CRL and determines in the copyright protection module 210k.
In addition, various kinds of encryption devices or decrypting devices are realized by combining the above processing of ten embodiments. That is, in the case of the encryption, ( 1) when we call each processing; i. en encryption for a secret key ii. an transformation by the one-way function as a layer, it is selectable for the system to be double layered or triple layered, (2) as for a key for the encryption of the content, it is selectable for the key to be a content key or to be a function value obtained by transforming a medium ID in the one-way function, (3) as for the associating object for the hashing value of the CRL, it is selectable for the object to be the device key, the disk key, the content key, the medium ID, the session key or to be the function value obtained by transforming the medium ID in the one-way function. Accordingly, various forms of the encryption device, the decrypting device and the IC card are realized by combining the above independent three parameters ( 1), (2) and (3) arbitrary. Also, a number of layers for the above encryption (or decrypting) of a secret key, etc are not limited only 1 to 3. The layer can be exceeded of 3. In consideration of these variations, the encryption device, the decrypting device, and the IC module (secret key generation device) for the present invention is to be described as below.
That is, regarding an encryption method using a content key; an encrypting method in an encryption device that encrypts a digital production and outputs the encrypted digital production to a recording medium or a transmission medium, the encrypting method includes:
( 1) an encrypting step for repeating a chain encryption process, for a first secret key thorough an (n-l)th secret key, of encrypting the digital production using the first secret key out of n (≥ 2) secret keys and encrypting an (i-l)th secret key using an i (2≤ i≤ n)th secret key; and
(2) an outputting step for outputting the encrypted first secret key thorough the (n-l)th secret key to the recording medium and the transmission medium, wherein the chain encryption process using at least one of the first secret key through the nth secret key includes a first step for transforming the secret key, prior to the encryption, using an attribute value dependent on details of a CRL which is an information list for specifying a revoked public key certificate.
Regarding an encryption method using the medium ID; an encrypting method in an encryption device that encrypts a digital production and outputs the encrypted digital production to a recording medium or a transmission medium, the encrypting method includes:
(1) an encrypting step for repeating a chain encryption and transformation process, for a first secret key thorough an (n-l)th secret key, of transforming a medium identification information with a one-way function using the first secret key out of n ( ≥ l) secret keys, encrypting the digital production using the transformed medium identification information, and in the case of n ≥ 2, encrypting an (i-l)th secret key using an i (2≤ i ≤ n)th secret key; and (2) an outputting step for outputting the encrypted first secret key thorough the (n-l)th secret key to the recording medium and the transmission medium, wherein the chain encryption or transformation process using at least one of the first secret key through the nth secret key includes a second step for (1) transforming the secret key, prior to the encryption, using an attribute valued dependent on details of a CRL which is an information list for specifying a revoked public key certificate, or (2) transforming the medium identification information obtained by the transformation with the attribute value. Regarding the decrypting method using a content; a decrypting method in a decrypting device that decrypts an encrypted digital production, the decrypting method includes : (1) a first decrypting step for repeating a chain decrypting process, for n ( ≥2) encrypted secret keys, of obtaining the encrypted digital production, the n encrypted secret keys and a CRL which is an information list for specifying a revoked public key certificate via a recording medium or a transmission medium, and decrypting a first encrypted secret key out of the n encrypted secret keys using a pre-holding secret key, and further decrypting an encrypted second secret key with the obtained first secret key; and
(2) a second decrypting step for decrypting the digital production with the nth secret key obtained by the final decrypting, wherein at least one of the chain decrypting processes using the first secret key through the n h secret key includes a third step for transforming the secret key used for the decrypting, prior to the decrypting, using an attribute value dependent on details of the CRL. Regarding the decrypting method using a medium ID; a decrypting method in a decrypting device that decrypts an encrypted digital production, the decrypting method includes: (1) a first decrypting step for repeating a chain decrypting process, for n (≥ l) encrypted secret keys, of obtaining the encrypted digital production, a medium identification information, n (≥ l) encrypted secret keys and a CRL which is an information list for specifying a revoked public key certificate via a recording medium or a transmission medium, decrypting a first secret keys using a pre-holding secret key, andjn the case of n (≥2), decrypting an encrypted second secret key with the obtained first secret key. (2) a second decrypting step for transforming the medium identification information by a one-way function using the nth secret key used for the final decrypting, and decrypting the digital production with the transformed medium identification information, wherein at least one of the chain decrypting processes using the first secret key though the nth secret key or the transformation of the medium identification information includes a forth step for (1) transforming the secret key used for the decrypting or the transformation, prior to the decrypting or the transformation, using an attribute value dependent on details of the CRL or (2) transforming the medium identification information obtained by the transformation using the attribute value.
Industrial Applicability
As stated above, the encryption device of the copyright protection system, the AV server, the decrypting device and the client can use a server, a set top box, a personal computer, a digital television, a VTR, a DVD recorder, a printer, a cellular phone and a personal digital assistance for delivering and receiving the content via the recording medium or the transmission medium as a computer device.

Claims

1. An encryption device that encrypts a digital production and outputs the digital production to a recording medium or a transmission medium, comprising : a digital production memory unit operable to memorize the digital production ; a first secret key memory unit operable to memorize a first secret key which is used for the encryption of the digital production; a second secret key memory unit operable to memorize a second secret key corresponding to a decrypting device that decrypts the encrypted digital production; a Certificate Revocation List (hereinafter referred to as a "CRL") memory unit operable to memorize a CRL which is an information list that specifies a revoked public key certificate; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the CRL memorized in the CRL memory unit; a transforming unit operable to transform the second secret key memorized in the second secret key memory unit with the attribute value calculated by the attribute value calculating unit; a first encryption unit operable to encrypt the first secret key memorized in the first secret key memory unit with the second secret key which is transformed by the transforming unit; a second encryption unit operable to encrypt the digital production memorized in the digital production memory unit with the first secret key memorized in the first secret key memory unit; and an outputting unit operable to output the CRL memorized in the CRL memory unit, the first secret key encrypted by the first encryption unit and the digital production encrypted by the second encryption unit to the recording medium or the transmission medium.
2. The encryption device according to Claim 1 further comprising a confirmation data outputting unit operable to output a confirmation data which is to be a criterion for confirming whether the first secret key decrypted by the decrypting device is a qualified key or not.
3. The encryption device according to Claim 2, wherein the confirmation data outputting unit outputs the confirmation data which is obtained by encrypting a predetermined fixed-pattern data with the first secret key memorized in the first secret key memory unit, to the recording medium or the transmission medium.
4. The encryption device according to Claim 2, wherein the confirmation data outputting unit outputs the confirmation data which is obtained by encrypting the first secret key memorized in the first secret key memory unit with the first secret key, to the recording medium or the transmission medium.
5. The encryption device according to Claim 1, wherein the attribute value calculating unit calculates a hashing value of the CRL as the attribute value, and the transforming unit transforms the second secret key by carrying out an exclusive OR between the second secret key and the hashing value.
6. An encryption device that encrypts a digital production and outputs the digital production to a recording medium or a transmission medium, comprising : a digital production memory unit operable to memorize the digital production; a first secret key memory unit operable to memorize a first secret key which is used for the encryption of the digital production; a second secret key memory unit operable to memorize a second secret key corresponding to a decrypting device that decrypts the encrypted digital production; a CRL memory unit operable to memorize a CRL which is an information list that specifies a revoked public key certificate; a first encryption unit operable to encrypt the first secret key memorized in the first secret key memory unit with the second secret key memorized in the second secret key memory unit; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the CRL memorized in the CRL memory unit; a transforming unit operable to transform the first secret key memorized in the first secret key memory unit with the attribute value calculated by the attribute value calculating unit; a second encryption unit operable to encrypt the digital production memorized in the digital production memory unit with the first secret key transformed by the transforming unit; and an outputting unit operable to output the CRL memorized in the CRL memory unit, the first secret key encrypted by the first encryption unit and the digital production encrypted by the second encryption unit to the recording medium or the transmission medium.
7. The encryption device according to Claim 6 further comprising a confirmation data outputting unit operable to output a confirmation data which is to be a criterion for confirming whether the first secret key decrypted by the decrypting device is a qualified key or not.
8. The encryption device according to Claim 7, wherein the confirmation data outputting unit outputs the confirmation data which is obtained by encrypting a predetermined fixed-pattern data with the first secret key transformed by the transforming unit, to the recording medium or the transmission medium.
9. The encryption device according to Claim 7, wherein the confirmation data outputting unit outputs the confirmation data which is obtained by encrypting the first secret key transformed by the transforming unit with the first secret key, to the recording medium or the transmission medium.
10. An encryption device that encrypts a digital production and outputs the digital production to a recording medium or a transmission medium, comprising : a digital production memory unit operable to memorize the digital production; a medium identification information memory unit operable to memorize a medium identification information which is used for the encryption of the digital production; a first secret key memory unit operable to memorize a first secret key corresponding to a decrypting, device that decrypts the encrypted digital production; a CRL memory unit operable to memorize a CRL which is an information list that specifies a revoked public key certificate; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the CRL memorized in the CRL memory unit; a transforming unit operable to transform the first secret key memorized in the first secret key memory unit with the attribute value calculated by the attribute value calculating unit; a function transformation unit operable to transform by inputting the medium identification information memorized in the medium identification information memory unit and the first secret key transformed by the transforming unit into a one-way function; a second encryption unit operable to encrypt the digital production memorized in the digital production memory unit with a function value obtained from the function transformation unit; and an outputting unit operable to output the CRL memorized in the CRL memory unit, the medium identification information memorized in the medium identification information memory unit, and the digital production encrypted by the second encryption unit, to the recording medium or the transmission medium.
11. An encryption device that encrypts a digital production and outputs the digital production to a recording medium or a transmission medium, comprising : a digital production memory unit operable to memorize the digital production ; a medium identification information memory unit operable to memorize a medium identification information which is used for the encryption of the digital production ; a first secret key memory unit operable to memorize a first secret key corresponding to a decrypting device that decrypts the encrypted digital production; a CRL memory unit operable to memorize a CRL which is an information list that specifies a revoked public key certificate; a function transformation unit operable to transform by inputting the medium identification information memorized in the medium identification information memory unit and the first secret key memorized in the first secret key memory unit into a one-way function; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the CRL memorized in the CRL memory unit; a transforming unit operable to transform a function value obtained from the function transformation unit with the attribute value calculated by the attribute value calculating unit; a first encryption unit operable to encrypt the digital production memorized in the digital production memory unit with the attribute value transformed by the transforming unit; and an outputting unit operable to output the CRL memorized in the CRL memory unit, the medium identification information memorized in the medium identification information memory unit, and the digital production encrypted by the first encryption unit, to the recording medium or the transmission medium.
12. An encryption device that encrypts a digital production and outputs the digital production to a recording medium or a transmission medium, comprising : a digital production memory unit operable to memorize the digital production; a first secret key memory unit operable to memorize a first secret key which is used for the encryption of the digital production; a second secret key memory unit operable to memorize a second secret key corresponding to a decrypting device that decrypts the encrypted digital production ; a third secret key memory unit operable to memorize a third secret key which is used for the encryption of the first secret key; a CRL memory unit operable to memorize a CRL which is an information list that specifies a revoked public key certificate; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the CRL memorized in the CRL memory unit; a transforming unit operable to transform the second secret key memorized in the second secret key memory unit with the attribute value calculated by the attribute value calculating unit; a first encryption unit operable to encrypt the third secret key memorized in the third secret key memory unit with the second secret key transformed by the transforming unit; a second encryption unit operable to encrypt the first secret key memorized in the first secret key memory unit with the third secret key memorized in the third secret key memory unit; a third encryption unit operable to encrypt the digital production memorized in the digital production memory unit with the first secret key memorized in the first secret key memory unit; and an outputting unit operable to output the CRL memorized in the CRL memory unit, the third secret key encrypted by the first encryption unit, the first secret key encrypted by the second encryption unit and the digital production encrypted by the third encryption unit, to the recording medium or the transmission medium.
13. The encryption device according to Claim 12 further comprising a confirmation data outputting unit operable to output a confirmation data which is to be a criterion for confirming whether the third secret key decrypted by the decrypting device is a qualified key or not.
14. The encryption device according to Claim 13, wherein the confirmation data outputting unit outputs the confirmation data which is obtained by encrypting a predetermined fixed-pattern data with the third secret key memorized in the third secret key memory unit, to the recording medium or the transmission medium.
15. The encryption device according to Claim 13, wherein the confirmation data outputting unit outputs the confirmation data which is obtained by encrypting the third secret key memorized in the third secret key memory unit with the third secret key, to the recording medium or the transmission medium.
16. An encryption device that encrypts a digital production and outputs the digital production to a recording medium or a transmission medium, comprising : a digital production memory unit operable to memorize the digital production; a first secret key memory unit operable to memorize a first secret key which is used for the encryption of the digital production; a second secret key memory unit operable to memorize a second secret key corresponding to a decrypting device that decrypts the encrypted digital production; a third secret key memory unit operable to memorize a third secret key which is used for the encryption of the first secret key; a CRL memory unit operable to memorize a CRL which is an information list that specifies a revoked public key certificate; a first encryption unit operable to encrypt the third secret key memorized in the third secret key memory unit with the second secret key memorized in the second secret key memory unit; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the CRL memorized in the CRL memory unit; a transforming unit operable to transform the third secret key memorized in the third secret key memory unit with the attribute value calculated by the attribute value calculating unit; a second encryption unit operable to encrypt the first secret key memorized in the first secret key memory unit with the attribute value transformed by the transforming unit; a third encryption unit operable to encrypt the digital production memorized in the digital production memory unit with the first secret key memorized in the first secret key memory unit; and an outputting unit operable to output the CRL memorized in the CRL memory unit, the third secret key encrypted by the first encryption unit, the first secret key encrypted by the second encryption unit and the digital production encrypted by the third encryption unit, to the recording medium or the transmission medium.
17. An encryption device that encrypts a digital production and outputs the digital production to a recording medium or a transmission medium, comprising : a digital production memory unit operable to memorize the digital production; a first secret key memory unit operable to memorize a first secret key which is used for the encryption of the digital production; a second secret key memory unit operable to memorize a second secret key corresponding to a decrypting device that decrypts the encrypted digital production; a third secret key memory unit operable to memorize a third secret key which is used for the encryption of the first secret key; a CRL memory unit operable to memorize a CRL which is an information list that specifies a revoked public key certificate; a first encryption unit operable to encrypt the third secret key memorized in the third secret key memory unit with the second secret key memorized in the second secret key memory unit; a second encryption unit operable to encrypt the first secret key memorized in the first secret key memory unit with the third secret key encrypted by the first secret key memory unit; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the CRL memorized in the CRL memory unit; a transforming unit operable to transform the first secret key memorized in the first secret key memory unit with the attribute value calculated by the attribute value calculating unit; a third encryption unit operable to encrypt the digital production memorized in the digital production memory unit with the first secret key transformed by the transforming unit; and an outputting unit operable to output the CRL memorized in the CRL memory unit, the third secret key encrypted by the first encryption unit, the first secret key encrypted by the second encryption unit and the digital production encrypted by the third encryption unit, to the recording medium or the transmission medium.
18. An encryption device that encrypts a digital production and outputs the digital production to a recording medium or a transmission medium, comprising : a digital production memory unit operable to memorize the digital production; a medium identification information memory unit operable to memorize a medium identification information which is used for the encryption of the digital production; a first secret key memory unit operable to memorize a first secret key corresponding to a decrypting device that decrypts the encrypted digital production; a second secret key memory unit operable to memorize a second secret key which is used for the encryption of the medium identification information; a CRL memory unit operable to memorize a CRL which is an information list that specifies a revoked public key certificate; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the CRL memorized in the CRL memory unit; a transforming unit operable to transform the first secret key memorized in the first secret key memory unit with the attribute value calculated by the attribute value calculating unit; a first encryption unit operable to encrypt the second secret key memorized in the second secret key memory unit with the first secret key transformed by the transforming unit; a function transformation unit operable to transform by inputting the medium identification information memorized in the medium identification information unit and the second secret key memorized in the second secret key memory unit into a one-way function; a second encryption unit operable to encrypt the digital production memorized in the digital production memory unit with a function value calculated by the function transformation unit; and an outputting unit operable to output the CRL memorized in the CRL memory unit, the second secret key encrypted by the first encryption unit, the medium identification information memorized in the medium identification information memory unit, and the digital production encrypted by the third encryption unit, to the recording medium or the transmission medium .
19. The encryption device according to Claim 18 further comprising a confirmation data outputting unit operable to output a confirmation data which is to be a criterion for confirming whether the second secret key decrypted by the decrypting device is a qualified key or not.
20. The encryption device according to Claim 19, wherein the confirmation data outputting unit outputs the confirmation data which is obtained by encrypting a predetermined fixed-pattern data with the second secret key memorized in the second secret key memory unit, to the recording medium or the transmission medium.
21. The encryption device according to Claim 19, wherein the confirmation data outputting unit outputs the confirmation data which is obtained by encrypting the second secret key memorized in the second secret key memory unit with the second secret key, to the recording medium or the transmission medium .
22. An encryption device that encrypts a digital production and outputs the digital production to a recording medium or a transmission medium, comprising : a digital production memory unit operable to memorize the digital production; a medium identification information memory unit operable to memorize a medium identification information which is used for an encryption of the digital production; a first secret key memory unit operable to memorize a first secret key corresponding to a decrypting device that decrypts the encrypted digital production; a second secret key memory unit operable to memorize a second secret key which is used for the encryption of the medium identification information; a CRL memory unit operable to memorize a CRL which is an information list that specifies a revoked public key certificate; a first encryption unit operable to encrypt the second secret key memorized in the second secret key memory unit with the first secret key memorized in the first secret key memory unit; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the CRL memorized in the CRL memory unit; a transforming unit operable to transform the second secret key memorized in the second secret key memory unit with the attribute value calculated by the attribute value calculating unit; a function transformation unit operable to transform by inputting the medium identification information memorized in the medium identification information memory unit and the second secret key transformed by the transforming unit into a one-way function ; a second encryption unit operable to encrypt the digital production memorized in the digital production memory unit with a function value calculated by the function transformation unit; and an outputting unit operable to output the CRL memorized in the CRL memory unit, the second secret key encrypted by the first encryption unit, the medium identification information memorized in the medium identification information memory unit, and the digital production encrypted by the third encryption unit, to the recording medium or the transmission medium .
23. An encryption device that encrypts a digital production and outputs the digital production to a recording medium or a transmission medium, comprising : a digital production memory unit operable to memorize the digital production; a medium identification information memory unit operable to memorize a medium identification information which is used for the encryption of the digital production; a first secret key memory unit operable to memorize a first secret key corresponding to a decrypting device that decrypts the encrypted digital production; a second secret key memory unit operable to memorize a second secret key which is used for the encryption of the medium identification information ; a CRL memory unit operable to memorize a CRL which is an information list that specifies a revoked public key certificate; a first encryption unit operable to encrypt the second secret key memorized in the second secret key memory unit with the first secret key memorized in the first secret key memory unit; a function transformation unit operable to transform by inputting the medium identification information memorized in the medium identification information memory unit and the second secret key memorized in the second secret key memory into a one-way function; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the CRL memorized in the CRL memory unit; a transforming unit operable to transform a function value obtained from the function transformation unit with the attribute value calculated by the attribute value calculating unit; a second encryption unit operable to encrypt the digital production memorized in the digital production memory unit with the function value transformed by the function transformation unit; and an outputting unit operable to output the CRL memorized in the CRL memory unit , the second secret key encrypted by the first encryption unit, the medium identification information memorized in the medium identification information memory unit, and the digital production encrypted by the second encryption unit, to the recording medium or the transmission medium.
24. A decrypting device that obtains an encrypted digital production via a recording medium or a transmission medium and decrypts the digital production, comprising : an obtaining unit operable to obtain the encrypted digital production, an encrypted first secret key that is generated by encrypting the first secret key used for the encryption of the digital production and a CRL which is an information list for specifying a revoked public key certificate, via the recoding medium or the transmission medium; a second secret key memory unit operable to memorize the second secret key specific to the decrypting device; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the obtained CRL; a transforming unit operable to transform the second secret key memorized in the second secret key memory unit with the attribute value calculated by the attribute value calculating unit; a first decrypting unit operable to decrypt the encrypted first secret key obtained from the obtaining unit with the second secret key transformed by the transforming unit; and a second decrypting unit operable to decrypt the encrypted digital production obtained from the obtaining unit with the first secret key decrypted by the first decrypting unit.
25. The decrypting device according to Claim 24, wherein the attribute value calculating unit calculates a hashing value of the CRL as the attribute value, and the transforming unit transforms the second secret key by carrying out an exclusive OR between the second secret key and the hashing value.
26. A decrypting device that obtains an encrypted digital production via a recording medium or a transmission medium and decrypts the digital production, comprising : an obtaining unit operable to obtain the encrypted digital production, an encrypted first secret key that is generated by encrypting the first secret key used for the encryption of the digital production and a CRL which is an information list for specifying a revoked public key certificate, via the recoding medium or the transmission medium; a second secret key memory unit operable to memorize the second secret key specific to the decrypting device; a first decrypting unit operable to decrypt the encrypted first secret key obtained from the obtaining unit with the second secret key memorized in the second secret key memory unit; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the CRL obtained from the obtaining unit; a transforming unit operable to transform the first secret key decrypted by the first decrypting unit with the attribute value calculated by the attribute value calculating unit; and a second decrypting unit operable to decrypt the encrypted digital production obtained from the obtaining unit with the first secret key transformed by the transforming unit.
27. A decrypting device that obtains an encrypted digital production via a recording medium or a transmission medium and decrypts the digital production, comprising : an obtaining unit operable to obtain the encrypted digital production, a medium identification information used for the encryption of the digital production and a CRL which is an information list for specifying a revoked public key certificate via the recoding medium or the transmission medium; a first secret key memory unit operable to memorize the first secret key specific to the decrypting device; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the obtained CRL; a transforming unit operable to transform the first secret key memorized in the first secret key memory unit with the attribute value calculated by the attribute value calculating unit; a function transformation unit operable to transform by inputting the medium identification information obtained from the obtaining unit and the first secret key transformed by the transforming unit into a one-way function; and a first decrypting unit operable to decrypt the encrypted digital production obtained from the obtaining unit with the function value calculated by the function transformation unit.
28. A decrypting device that obtains an encrypted digital production via a recording medium or a transmission medium and decrypts the digital production, comprising : an obtaining unit operable to obtain an encrypted digital production, a medium identification information used for the encryption of the digital production and a CRL which is an information list for specifying a revoked public key certificate via a recoding medium or a transmission medium; a first secret key memory unit operable to memorize the first secret key specific to the decrypting device; a function transformation unit operable to transform by inputting a medium identification information obtained from the obtaining unit and the first secret key memorized in the first secret key memory unit into a one-way function; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the obtained CRL; a transforming unit operable to transform the function value obtained from the function transformation unit with the attribute value calculated by the attribute value calculating unit; and a first decrypting unit operable to decrypt the encrypted digital production obtained from the obtaining unit with the attributed value transformed by the transforming unit.
29. A decrypting device that obtains an encrypted digital production via a recording medium or a transmission medium and decrypts the digital production, comprising : an obtaining unit operable to obtain the encrypted digital production, an encrypted first secret key that is generated by encrypting the first secret key used for the encryption of the digital production, an encrypted second secret key that is generated by encrypting the second secret key used for the encryption of the first secret key and a CRL which is an information list for specifying a revoked public key certificate via the recoding medium or the transmission medium; a third secret key memory unit operable to memorize a third secret key specific to the decrypting device; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the obtained CRL; a transforming unit operable to transform the third secret key memorized in the third secret key memory unit with the attribute value calculated in the attribute value calculating unit; a first decrypting unit operable to decrypt the encrypted second secret key obtained from the obtaining unit with the third secret key transformed by the transforming unit; a second decrypting unit operable to decrypt the encrypted first secret key obtained from the obtaining unit with the second secret key decrypted by the first decrypting unit; and a third decrypting unit operable to decrypt the encrypted digital production obtained from the obtaining unit with the first secret key decrypted by the second decrypting unit.
30. A decrypting device that obtains an encrypted digital production via a recording medium or a transmission medium and decrypts the digital production, comprising : an obtaining unit operable to obtain the encrypted digital production, an encrypted first secret key that is generated by encrypting the first secret key used for the encryption of the digital production, an encrypted second secret key that is generated by encrypting the second secret key used for the encryption of the first secret key and a CRL which is an information list for specifying a revoked public key certificate via a recoding medium or a transmission medium; a third secret key memory unit operable to memorize a third secret key specific to the decrypting device; a first decrypting unit operable to decrypt the encrypted second secret key obtained from the obtaining unit with the third secret key memorized in the third secret key memory unit; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the obtained CRL; a transforming unit operable to transform the second secret key decrypted by the first decrypting unit with the attribute value calculated by the attribute value calculating unit; a second decrypting unit operable to decrypt the encrypted first secret key obtained from the obtaining unit with the second secret key transformed by the transforming unit; and a third decrypting unit operable to decrypt the encrypted digital production obtained from the obtaining unit with the first secret key decrypted by the second decrypting unit.
31. A decrypting device that obtains the encrypted digital production via a recording medium or a transmission medium and decrypts the digital production, comprising : an obtaining unit operable to obtain the encrypted digital production, an encrypted first secret key that is generated by encrypting the first secret key used for the encryption of the digital production, an encrypted second secret key that is generated by encrypting the second secret key used for the encryption of the first secret key and a CRL which is an information list for specifying a revoked public key certificate via the recoding medium or the transmission medium; a third secret key memory unit operable to memorize a third secret key specific to the decrypting device; a first decrypting unit operable to decrypt the encrypted second secret key obtained from the obtaining unit with the third secret key memorized in the first secret key memory unit; a second decrypting unit operable to decrypt the encrypted first secret key obtained from the obtaining unit with the second secret key decrypted by the first decrypting unit; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the obtained CRL; a transforming unit operable to transform the first secret key decrypted by the second decrypting unit with the attribute value calculated by the attribute value calculating unit; and a third decrypting unit operable to decrypt the encrypted digital production obtained from the obtaining unit with the first secret key transformed by the transforming unit.
32. A decrypting device that obtains an encrypted digital production via a recording medium or a transmission medium and decrypts the digital production, comprising : an obtaining unit operable to obtain the encrypted digital production, a medium identification information used for the encryption of the digital production, an encrypted first secret key that is generated by encrypting the first secret key used for the encryption of the medium identification information and a CRL which is an information list for specifying a revoked public key certificate via the recoding medium or the transmission medium; a second secret key memory unit operable to memorize the second secret key specific to the decrypting device; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the obtained CRL; a transforming unit operable to transform the second secret key memorized in the second secret key memory unit with the attribute value calculated in the attribute value calculating unit; a first decrypting unit operable to decrypt the encrypted first secret key obtained from the obtaining unit with the second secret key transformed by the transforming unit; a function transformation unit operable to transform by inputting the medium identification information obtained from the obtaining unit with the first secret key decrypted by the first decrypting unit into a one-way function; and a second decrypting unit operable to decrypt the encrypted digital production obtained from the obtaining unit with the function value calculated by the function transformation unit.
33. A decrypting device that obtains an encrypted digital production via a recording medium or a transmission medium and decrypts the digital production, comprising : an obtaining unit operable to obtain the encrypted digital production, a medium identification information used for the encryption of the digital production, an encrypted first secret key that is generated by encrypting the first secret key used for the encryption of the medium identification information and a CRL which is an information list for specifying a revoked public key certificate via the recoding medium or the transmission medium; a second secret key memory unit operable to memorize the second secret key specific to the decrypting device; a first decrypting unit operable to decrypt the encrypted first secret key obtained from the obtaining unit with the second secret key memorized in the second secret key memory unit; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the obtained CRL; a transforming unit operable to transform the first secret key decrypted by the first decrypting unit with the attribute value calculated by the attribute value calculating unit; a function transformation unit operable to transform by inputting the medium identification information obtained from the obtaining unit and the attribute value transformed by the transforming unit into a one-way function; and a second decrypting unit operable to decrypt the encrypted digital production obtained from the obtaining unit with the function value obtained from the function transformation unit.
34. A decrypting device that obtains an encrypted digital production via a recording medium or a transmission medium and decrypts the digital production, comprising : an obtaining unit operable to obtain the encrypted digital production, a medium identification information used for the encryption of the digital production, an encrypted first secret key that is generated by encrypting the first secret key used for the encryption of the medium identification information and a CRL which is an information list for specifying a revoked public key certificate via the recoding medium or the transmission medium; a second secret key memory unit operable to memorize the second secret key specific to the decrypting device; a first decrypting unit operable to decrypt the encrypted first secret key obtained from the obtaining unit with the second secret key memorized in the second secret key memory unit; a function transformation unit operable to transform by inputting the medium identification information obtained from the obtaining unit and the first secret key decrypted by the first decrypting unit into a one-way function ; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the obtained CRL; a transforming unit operable to transform the function value obtained from the function transformation unit with the attribute value calculated by the attribute value calculating unit; and a second decrypting unit operable to decrypt the encrypted digital production obtained from the obtaining unit with the function value transformed by the transforming unit.
35. A secret key generating device that outputs a secret key for decrypting to a decrypting device which decrypts an encrypted digital production, comprising : an obtaining unit operable to obtain the encrypted first secret key that is generated by encrypting the first secret key used for the encryption of the digital production and a CRL which is an information list for specifying a revoked public key certificate via the recoding medium or the transmission medium; a second secret key memory unit operable to memorize a second secret key specific to the secret key generating device; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the obtained CRL; a transforming unit operable to transform the second secret key memorized in the second secret key memory unit with the attribute value calculated by the attribute value calculating unit; a first decrypting unit operable to decrypt the encrypted first secret key obtained from the obtaining unit with the second secret key transformed by the transforming unit; and an outputting unit operable to output the first secret key decrypted by the first decrypting unit as a secret key for decrypting the digital production.
36. The secret key generating device according to Claim 35, further comprising a verification unit operable to verify whether the first secret key decrypted by the first decrypting unit is a qualified first secret key used for the encryption of the digital production or not.
37. The secret key generating device according to Claim 36, wherein the verification unit includes: a confirmation data obtaining unit operable to obtain a confirmation data, which is to be a criterion for the verification, via the recording medium or the transmission medium ; a confirmation data decrypting unit operable to decrypt the obtained confirmation data with the first secret key decrypted by the first decrypting unit; and a verification unit operable to verify whether the data obtained by decrypting by the confirmation data decrypting unit matches a predetermined fixed-pattern data or not, and determine that the first secret key is a qualified key upon being confirmed that the two data match.
38. The secret key generating unit according to Claim 36, wherein the verification unit includes: a confirmation data obtaining unit operable to obtain a confirmation data, which is to be a criterion for the verification, via the recording medium or the transmission medium; a first secret key encryption unit operable to encrypt the first secret key decrypted by the first decrypting unit with the first secret key; and a verification unit operable to verify whether the first secret key encrypted by the first secret key encryption unit matches the confirmation data obtained from the confirmation data obtaining unit or not, and determine the first secret key is a qualified key upon being confirmed that the two data match.
39. The secret key generating unit according to Claim 36, wherein the verification unit includes: a confirmation data obtaining unit operable to obtain a confirmation data, which is to be a criterion for the verification, via the recording medium or the transmission medium; a confirmation data decrypting unit operable to decrypt the confirmation data obtained from the confirmation data obtaining unit with the first secret key decrypted by the first decrypting unit; and a verification unit operable to verify whether the value decrypted by the confirmation data decrypting unit matches the first secret key decrypted by the first decrypting unit or not, and determine that the first secret key is the qualified key upon being confirmed that the two data match.
40. The secret key generating device according to Claim 35, wherein the attribute value calculating unit calculates a hashing value of the CRL as the attribute value, and the transforming unit transforms the second secret key by carrying out an exclusive OR between the second secret key and the hashing value.
41. A secret key generating device that outputs a secret key for decrypting to a decrypting device which decrypts an encrypted digital production, comprising : an obtaining unit operable to obtain the encrypted first secret key that is generated by encrypting an first secret key used for the encryption of the digital production and a CRL which is an information list for specifying a revoked public key certificate via a recoding medium or a transmission medium; a second secret key memory unit operable to memorize a second secret key specific to the secret key generating device; a first decrypting unit operable to decrypt the encrypted first secret key obtained from the obtaining unit with the second secret key memorized in the second secret key memory unit; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the CRL obtained from the obtaining unit; a transforming unit operable to transform the first secret key decrypted by the first decrypting unit with the attribute value calculated by the attribute value calculating unit; and an outputting unit operable to output the first secret key transformed by the transforming unit as a secret key for decrypting the digital production.
42. The secret key generating device according to Claim 41, further comprising a verification unit operable to verify whether the first secret key transformed by the transforming unit is a qualified first secret key used for the encryption of the digital production or not.
43. The secret key generating device according to Claim 42, wherein the verification unit includes : a confirmation data obtaining unit operable to obtain a confirmation data, which is to be a criterion for the verification, via the recording medium or the transmission medium; a confirmation data decrypting unit operable to decrypt the obtained confirmation data with the first secret key transformed by the transforming unit; and a verification unit operable to verify whether the data obtained by decrypting in the confirmation data decrypting unit matches with a predetermined fixed-pattern data or not, and determine the first secret key is a qualified key upon being confirmed that the two data match.
44. The secret key generating device according to Claim 42, wherein the verification unit includes: a confirmation data obtaining unit operable to obtain a confirmation data which is to be a criterion for the verification via the recording medium or the transmission medium; a first secret key encryption unit operable to encrypt the first secret key transformed by the transforming unit with the first secret key; and a verification unit operable to verify whether the first secret key encrypted by the first secret key memory unit matches the confirmation data obtained from the confirmation data obtaining unit or not, and determines that the first secret key is a qualified key upon being confirmed that two data match.
45. The secret key generating device according to Claim 42, wherein the verification unit includes : a confirmation data obtaining unit operable to obtain a confirmation data which is to be a criterion for the verification via the recording medium or the transmission medium; a confirmation data decrypting unit operable to decrypt the confirmation data obtained from the confirmation data obtaining unit with the first secret key transformed by the transforming unit; and a verification unit operable to verify whether the value decrypted by the confirmation data decrypting unit matches the first secret key transformed by the transforming unit or not, and determine that the first secret key is a qualified key upon being confirmed that the two data match.
46. A secret key generating device that outputs a secret key for decrypting to a decrypting device which decrypts an encrypted digital production, comprising : an obtaining unit operable to obtain a medium identification information used for the encryption of the digital production and a CRL which is an information list for specifying a revoked public key certificate via a recoding medium or a transmission medium ; a first secret key memory unit operable to memorize a first secret key specific to the decrypting device; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the obtained CRL; a transforming unit operable to transform the first secret key memorized in the first secret key memory unit with the attribute value calculated by the attribute value calculating unit; a function transformation unit operable to transform by inputting the medium identification information obtained from the obtaining unit and the first secret key transformed by the transforming unit into a one-way function; and an outputting unit operable to output the function value obtained from the function transformation unit as a secret key for decrypting the digital production to the decrypting device.
47. A secret key generating device that outputs a secret key for decrypting to a decrypting device which decrypts an encrypted digital production, comprising : an obtaining unit operable to obtain a medium identification information used for an encryption of the digital production and a
CRL which is an information list for specifying a revoked public key certificate via a recoding medium or a transmission medium; a first secret key memory unit operable to memorize a first secret key specific to the decrypting device; a function transformation unit operable to transform by inputting the medium identification information obtained from the obtaining unit and the first secret key memorized in the first secret key memory unit into a one-way function ; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the CRL obtained from the obtaining unit; a transforming unit operable to transform the function value obtained from the function value calculating unit with the attribute value calculated by the attribute value calculating unit; and an outputting unit operable to output the attribute value transformed by the transforming unit as a secret key for decrypting the digital production to the decrypting device.
48. A secret key generating device that outputs a secret key for decrypting to a decrypting device which decrypts an encrypted digital production, comprising : an obtaining unit operable to obtain the encrypted first secret key that is generated by encrypting a first secret key used for the encryption of the digital production, an encrypted second secret key that is generated by encrypting a second secret key used for the encryption of the first secret key and a CRL which is an information list for specifying a revoked public key certificate via a recoding medium or a transmission medium; a third secret key memory unit operable to memorize a third secret key specific to the secret key generating device; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the obtained CRL; a transforming unit operable to transform the third secret key memorized in the third secret key with the attribute value calculated by the attribute value calculating unit; a first decrypting unit operable to decrypt the encrypted second secret key obtained from the obtaining unit with the third secret key transformed by the transforming unit; a second decrypting unit operable to decrypt the encrypted first secret key obtained from the obtaining unit with the second secret key decrypted by the first decrypting .unit; and an outputting unit operable to output the first secret key decrypted by the second decrypting unit as a secret key for decrypting the digital production to the decrypting device.
49. The secret key generating device according to Claim 48, further comprising a verification unit operable to verify whether the second secret key decrypted by the first decrypting unit is a qualified second secret key used for the encryption of the second secret key or not.
50. The secret key generating device according to Claim 49, wherein the verification unit includes : a confirmation data obtaining unit operable to obtain a confirmation data which is to be a criterion for the verification via the recording medium or the transmission medium; a confirmation data decrypting unit operable to decrypt the obtained confirmation data with the second secret key decrypted by the first decrypting unit; and a verification unit operable to verify whether the data obtained by decrypting in the confirmation data decrypting unit matches with a predetermined fixed-pattern data or not, and determine that the second secret key is a qualified key upon being confirmed that the two data match .
51. The secret key generating unit according to Claim 49, wherein the verification unit includes: a confirmation data obtaining unit operable to obtain a confirmation data, which is to be a criterion for the verification, via the recording medium or the transmission medium; a second secret key encryption unit operable to encrypt the second secret key decrypted by the first decrypting unit with the second secret key; and a verification unit operable to verify whether the second secret key encrypted by the second secret key encryption unit matches a confirmation data obtained from the confirmation data obtaining unit or not, and determine the second secret key is a qualified key upon being confirmed that the two data match .
52. The secret key generating unit according to Claim 49, wherein the verification unit includes: a confirmation data obtaining unit operable to obtain the confirmation data, which is to be a criterion for the verification, via the recording medium or the transmission medium; a confirmation data decrypting unit operable to decrypt a confirmation data obtained from the confirmation data obtaining unit with the second secret key decrypted by the first decrypting unit; and a verification unit operable to verify whether the value decrypted by the confirmation data decrypting unit matches the second secret key decrypted by the first decrypting unit or not, and determine the second secret key is a qualified key upon being confirmed that the two data match .
53. A secret key generating device that outputs a secret key for decrypting to a decrypting device which decrypts an encrypted digital production, comprising : an obtaining unit operable to obtain the encrypted first secret key that is generated by encrypting a first secret key used for the encryption of the digital production, an encrypted second secret key that is generated by encrypting a second secret key used for the encryption of the first secret key and a CRL which is an information list for specifying a revoked public key certificate via a recoding medium or a transmission medium; a third secret key memory unit operable to memorize a third secret key specific to the secret key generating device; a first decrypting unit operable to decrypt the encrypted second secret key obtained from the obtaining unit with the third secret key memorized in the third secret key memory unit; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the obtained CRL; a transforming unit operable to transform the second secret key decrypted by the first decrypting unit with the attribute value calculated by the attribute value calculating unit; a second decrypting unit operable to decrypt the encrypted first secret key obtained from the obtaining unit with the second secret key transformed by the transforming unit; and an outputting unit operable to output the first secret key decrypted by the second decrypting unit as a secret key for decrypting the digital production to the decrypting device.
54. A secret key generating device that outputs a secret key for decrypting to a decrypting device decrypts an encrypted digital production, comprising : an obtaining unit operable to obtain the encrypted first secret key that is generated by encrypting a first secret key used for the encryption of the digital production, an encrypted second secret key that is generated by encrypting a second secret key used for the encryption of the first secret key and a CRL which is an information list for specifying a revoked public key certificate via a recoding medium or a transmission medium; a first decrypting unit operable to decrypt the encrypted second secret key obtained from the obtaining unit with the third secret key memorized in the first secret key memory unit; a second decrypting unit operable to decrypt the encrypted first secret key obtained from the obtaining unit with the second secret key decrypted by the first decrypting unit; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the obtained CRL; a transforming unit operable to transform the first secret key decrypted by the second decrypting unit with the attribute value calculated by the attribute value calculating unit; and an outputting unit operable to output the first secret key decrypted by the second decrypting unit as a secret key for decrypting the digital production to the decrypting device.
55. A secret key generating device that outputs a secret key for decrypting to a decrypting device decrypts an encrypted digital production, comprising : an obtaining unit operable to obtain a medium identification information used for the encryption of the digital production, an encrypted first secret key that is generated by encrypting the first secret key used for the encryption of the medium identification information and a CRL which is an information list for specifying a revoked public key certificate via a recoding medium or a transmission medium; a second secret key memory unit operable to memorize a second secret key specific to the secret key generating device; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the obtained CRL; a transforming unit operable to transform the second secret key memorized in the second secret key memory unit with the attribute value calculated by the attribute value calculating unit; a first decrypting unit operable to decrypt the encrypted first secret key obtained from the obtaining unit with the second secret key transformed by the transforming unit; a function transformation unit operable to transform by inputting the medium identification information obtained from the obtaining unit and the first secret key decrypted by the first decrypting unit into a one-way function; and an outputting unit operable to output the function value obtained from the function transformation unit as a secret key for decrypting the digital production to the decrypting device.
56. The secret key generating device according to Claim 55, further comprising a verification unit operable to verify whether the first secret key decrypted by the first decrypting unit is a qualified first secret key used for the encryption of the medium identification information or not.
57. The secret key generating device according to Claim 56, wherein the verification unit includes: a confirmation data obtaining unit operable to obtain a confirmation data, which is to be a criterion for the verification, via the recording medium or the transmission medium; a confirmation data decrypting unit operable to decrypt the obtained confirmation data with the first secret key decrypted by the first decrypting unit; and a verification unit operable to verify whether the data obtained by decrypting in the confirmation data decrypting unit matches with a predetermined fixed-pattern data or not, and determine the first secret key is a qualified key upon being confirmed that the two data match.
58. The secret key generating unit according to Claim 56, wherein the verification unit includes: a confirmation data obtaining unit operable to obtain a confirmation data, which is to be a criterion for the verification, via the recording medium or the transmission medium; a first secret key encryption unit operable to encrypt the first secret key decrypted by the first decrypting unit with the first secret key; and a verification unit operable to verify whether the first secret key encrypted by the first secret key encryption unit matches a confirmation data obtained from the confirmation data obtaining unit or not, and determine the first secret key is a qualified key upon being confirmed that two data match.
59. The secret key generating unit according to Claim 56, wherein the verification unit includes: a confirmation data obtaining unit operable to obtain a confirmation data, which is to be a criterion for the verification, via the recording medium or the transmission medium; a confirmation data decrypting unit operable to decrypt the confirmation data obtained from the confirmation data obtaining unit with the first secret key decrypted by the first decrypting unit; and a verification unit operable to verify whether the value decrypted by the confirmation data decrypting unit matches the first secret key decrypted by the first decrypting unit or not, and determine the first secret key is a qualified key upon being confirmed that the two data match.
60. A secret key generating device that outputs a secret key for decrypting for the decrypting device decrypts an encrypted digital production, comprising : an obtaining unit operable to obtain a medium identification information used for the encryption of the digital production, an encrypted first secret key that is generated by encrypting the first secret key used for the encryption of the medium identification information and a CRL which is an information list for specifying a revoked public key certificate via a recoding medium or a transmission medium; a second secret key memory unit operable to memorize a second secret key specific to the secret key generating device; a first decrypting unit operable to decrypt the encrypted first secret key obtained from the obtaining unit with the second secret key memorized in the second secret key memory unit; an attribute value calculating unit operable to calculate an attribute value dependent on the obtained CRL; a transforming unit operable to transform the first secret key decrypted by the first decrypting unit with the attribute value calculated by the attribute value calculating unit; a function transformation unit operable to transform by inputting the medium identification information obtained from the obtaining unit and the attribute value calculated by the attribute value calculating unit into a one-way function; and an outputting unit operable to output the function value obtained from the function transformation unit as a secret key for decrypting the digital production to the decrypting device.
61. A secret key generating device that outputs a secret key for decrypting for the decrypting device decrypts an encrypted digital production, comprising : an obtaining unit operable to obtain a medium identification information used for the encryption of the digital production, an encrypted first secret key that is generated by encrypting the first secret key used for the encryption of the medium identification information and a CRL which is an information list for specifying a revoked public key certificate via a recoding medium or a transmission medium; a second secret key memory unit operable to memorize a second secret key specific to the decrypting device; a first decrypting unit operable to decrypt the encrypted first secret key obtained from the obtaining unit with the second secret key memorized in the second secret key memory unit; a function transformation unit operable to transform by inputting the medium identification information obtained from the obtaining unit and the first secret key decrypted by the first decrypting unit into a one-way function; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the obtained CRL; a transforming unit operable to transform the function value transformed by the function transformation unit with the attribute value calculated by the attribute value calculating unit; and an outputting unit operable to output the function value obtained from the function transformation unit as a secret key for decrypting the digital production to the decrypting device.
62. A copyright protection system for transmitting a digital production safely via a recording medium or a transmission medium, comprising : an encryption device that encrypts the digital production and outputs the digital production to the recording medium or the transmission medium; and a decrypting device that obtains the encrypted digital production via the recording medium or the transmission medium and decrypts the digital production, wherein the encryption device includes: a digital production memory unit operable to memorize the digital production ; a first secret key memory unit operable to memorize a first secret key which is used for the encryption of the digital production; a second secret key memory unit operable to memorize a second secret key corresponding to the decrypting device that decrypts the encrypted digital production; a CRL memory unit operable to memorize a CRL which is an information list for specifying a revoked public key certificate; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the CRL memorized in the CRL memory unit; a transforming unit operable to transform the second secret key memorized in the second secret key memory unit with the attribute value calculated by the attribute value calculating unit; a first encryption unit operable to encrypt the first secret key memorized in the first secret key memory unit with the second secret key which is transformed by the transforming unit; a second encryption unit operable to encrypt the digital production memorized in the digital production memory unit with the first secret key memorized in the first secret key memory unit; and an outputting unit operable to output the CRL memorized in the CRL memory unit , the first secret key encrypted by the first encryption unit and the digital production encrypted by the second encryption unit to the recording medium or the transmission medium, and the decrypting device includes: an obtaining unit operable to obtain the encrypted digital production, an encrypted first secret key that is generated by encrypting the first secret key for the encryption of the digital production and the CRL which is an information list for specifying a revoked public key certificate via the recoding medium or the transmission medium; a second secret key memory unit operable to memorize the second secret key specific to the decrypting device; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the CRL memorized in the CRL memory unit; a transforming unit operable to transform the second secret key memorized in the second secret key memory unit with the attribute value calculated in the attribute value calculating unit; a first decrypting unit operable to decrypt the encrypted first secret key obtained from the obtaining unit with the second secret key transformed by the transforming unit; and a second decrypting unit operable to decrypt the encrypted digital production obtained from the obtaining unit with the first secret key decrypted by the first decrypting unit.
63. A copyright protection system for transmitting a digital production safely via a recording medium or a transmission medium, comprising : an encryption device that encrypts the digital production and outputs the digital production to the recording medium or the transmission medium; and a decrypting device that obtains the encrypted digital production via the recording medium or the transmission medium and decrypts the digital production, wherein the encryption device includes : a digital production memory unit operable to memorize the digital production; a first secret key memory unit operable to memorize a first secret key which is used for the encryption of the digital production; a second secret key memory unit operable to memorize a second secret key corresponding to a decrypting device that decrypts an encrypted digital production; a CRL memory unit operable to memorize a CRL which is an information list for specifying a revoked public key certificate; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the CRL memorized in the CRL memory unit; a transforming unit operable to transform the second secret key memorized in the second secret key memory unit with the attribute value calculated by the attribute value calculating unit; a first encryption unit operable to encrypt the first secret key memorized in the first secret key memory unit with the second secret key which is transformed by the transforming unit; a second encryption unit operable to encrypt the digital production memorized in the digital production memory unit with the first secret key memorized in the first secret key memory unit; and an outputting unit operable to output the CRL memorized in the CRL memory unit , the first secret key encrypted by the first encryption unit and the digital production encrypted by the second encryption unit to the recording medium or the transmission medium, and wherein the attribute value calculating unit calculates a hashing value of the CRL as the attribute value, and the transforming unit transforms the second secret key by carrying out an exclusive OR between the second secret key and the hashing value, and the decrypting device includes: an obtaining unit operable to obtain the encrypted digital production, an encrypted first secret key that is generated by encrypting the first secret key for the encryption of the digital production and the CRL which is an information list for specifying a revoked public key certificate via the recoding medium or the transmission medium ; a second secret key memory unit operable to memorize the second secret key specific to the decrypting device; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on a CRL memorized in the CRL memory unit; a transforming unit operable to transform the second secret key memorized in the second secret key memory unit with the attribute value calculated by the attribute value calculating unit; a first decrypting unit operable to decrypt the encrypted first secret key obtained from the obtaining unit with the second secret key transformed by the transforming unit; and a second decrypting unit operable to decrypt the encrypted digital production obtained from the obtaining unit with the first secret key decrypted by the first decrypting unit, wherein the attribute value calculating unit calculates a hashing value of the CRL as the attribute value, and the transforming unit transforms the second secret key by carrying out an exclusive OR between the second secret key and the hashing value.
64. A copyright protection system is a system that transmits a digital production safely via a recording medium or a transmission medium, comprising : an encryption device that encrypts the digital production and outputs the digital production to a recording medium or a transmission medium; and a decrypting device that obtains the encrypted digital production via the recording medium or the transmission medium and decrypts the digital production, wherein the encryption device includes: a digital production memory unit operable to memorize the digital production; a first secret key memory unit operable to memorize a first secret key which is used for the encryption of the digital production; a second secret key memory unit operable to memorize a second secret key corresponding to the decrypting device that decrypts the encrypted digital production; a CRL memory unit operable to memorize a CRL which is an information list that specifies a revoked public key certificate; a first encryption unit operable to encrypt the first secret key memorized in the first secret key memory unit with the second secret key memorized in the second secret key memory unit; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the CRL memorized in the CRL memory unit; a transforming unit operable to transform the first secret key memorized in the first secret key memory unit with the attribute value calculated by the attribute value calculating unit; . a second encryption unit operable to encrypt the digital production memorized in the digital production memory unit with the first secret key transformed by the transforming unit; and an outputting unit operable to output the CRL memorized in the CRL memory Unit, the first secret key encrypted by the first encryption unit and the digital production encrypted by the second encryption unit to the recording medium or the transmission medium, and the decrypting device includes: an obtaining unit operable to obtain the encrypted digital production, an encrypted first secret key that is generated by encrypting the first secret key used for the encryption of the digital production and the CRL which is an information list for specifying a revoked public key certificate, via the recoding medium or the transmission medium; a second secret key memory unit operable to memorize the second secret key specific to the decrypting device; a first decrypting unit operable to decrypt the encrypted first secret key obtained from the obtaining unit with the second secret key memorized in the second secret key memory unit; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the CRL obtained from the obtaining unit; a transforming unit operable to transform the first secret key decrypted by the first decrypting unit with the attribute value calculated in the attribute value calculating unit; and a second decrypting unit operable to decrypt the encrypted digital production obtained from the obtaining unit with the first secret key transformed by the transforming unit.
65. A copyright protection system is a system that transmits a digital production safely via a recording medium or a transmission medium, comprising : an encryption device that encrypts the digital production and outputs the digital production to the recording medium or the transmission medium; and a decrypting device that obtains the encrypted digital production via the recording medium or the transmission medium and decrypts the digital production, wherein the encryption device includes: a digital production memory unit operable to memorize the digital production; a medium identification information memory unit operable to memorize a medium identification information which is used for the encryption of the digital production; a first secret key memory unit operable to memorize the first secret key corresponding to the decrypting device that decrypts the encrypted digital production; a CRL memory unit operable to memorize a CRL which is an information list that specifies a revoked public key certificate; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the CRL memorized in the CRL memory unit; a transforming unit operable to transform the first secret key memorized in the first secret key memory unit with the attribute value calculated by the attribute value calculating unit; a function transformation unit operable to transform by inputting the medium identification information memorized in the medium identification information memory unit and the first secret key transformed by the transforming unit into a one-way function; a second encryption unit operable to encrypt the digital production memorized in the digital production memory unit with a function value obtained from the function transformation unit; and an outputting unit operable to output the CRL memorized in the CRL memory unit, the medium identification information memorized in the medium identification information memory unit, and the digital production encrypted by the second encryption unit, to the recording medium or the transmission medium, and the decrypting device includes: an obtaining unit operable to obtain an encrypted digital production, the medium identification information used for the encryption of the digital production and the CRL which is an information list for specifying a revoked public key certificate via the recoding medium or the transmission medium; a first secret key memory unit operable to memorize the first secret key specific to the decrypting device; an attribute value calculating unit operable to calculate an attribute value dependent on details of a CRL based on an obtained CRL; a transforming unit operable to transform the first secret key memorized in the first secret key memory unit with the attribute value calculated in the attribute value calculating unit; a function transformation unit operable to transform by inputting the medium identification information obtained from the obtaining unit and the first secret key transformed by the transforming unit into the one-way function; and a first decrypting unit operable to decrypt the encrypted digital production obtained from the obtaining unit with the function value calculated by the function transformation unit.
66. A copyright protection system is a system that transmits a digital production safely via a recording medium or a transmission medium, comprising : an encryption device that encrypts the digital production and outputs the digital production to the recording medium or the transmission medium; and a decrypting device that obtains the encrypted digital production via the recording medium or the transmission medium and decrypts the digital production, wherein the encryption device includes: a digital production memory unit operable to memorize the digital production; a medium identification information memory unit operable to memorize a medium identification information which is used for the encryption of the digital production; a first secret key memory unit operable to memorize the first secret key corresponding to a decrypting device that decrypts the encrypted digital production; a CRL memory unit operable to memorize a CRL which is an information list that specifies a revoked public key certificate; a function transformation unit operable to transform by inputting the medium identification information memorized in the medium identification information memory unit and the first secret key memorized in the first secret key memory unit into a one-way function; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the CRL memorized in the CRL memory unit; a transforming unit operable to transform a function value obtained from the function transformation unit with the attribute value calculated by the attribute value calculating unit; a first encryption unit operable to encrypt the digital production memorized in the digital production memory unit with the attribute value transformed by the transforming unit; and an outputting unit operable to output the CRL memorized in the CRL memory unit, the medium identification information memorized in the medium identification information memory unit, and the digital production encrypted by the first encryption unit, to the recording medium or the transmission medium, and the decrypting device includes: an obtaining unit operable to obtain the encrypted digital production, the medium identification information used for the encryption of the digital production and the CRL which is an information list for specifying a revoked public key certificate via the recoding medium or the transmission medium; a first secret key memory unit operable to memorize the first secret key specific to the decrypting device; a function transformation unit operable to transform by inputting the medium identification information obtained from the obtaining unit and the first secret key memorized in the first secret key memory unit into a one-way function; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the obtained CRL; a transforming unit operable to transform the function value obtained from the function transformation unit with the attribute value calculated by the attribute value calculating unit; and a first decrypting unit operable to decrypt the encrypted digital production obtained from the obtaining unit with the attributed value transformed by the transforming unit.
67. A copyright protection system is a system that transmits a digital production safely via a recording medium or a transmission medium, comprising : an encryption device that encrypts the digital production and outputs the digital production to the recording medium or the transmission medium; and a decrypting device that obtains the encrypted digital production via the recording medium or the transmission medium and decrypts the digital production, wherein the encryption device includes : a digital production memory unit operable to memorize the digital production; a first secret key memory unit operable to memorize a first secret key which is used for the encryption of the digital production ; a second secret key memory unit operable to memorize a second secret key corresponding to the decrypting device that decrypts the encrypted digital production; a third secret key memory unit operable to memorize a third secret key which is used for the encryption of the first secret key; a CRL memory unit operable to memorize a CRL which is an information list that specifies a revoked public key certificate; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the CRL memorized in the CRL memory unit; a transforming unit operable to transform the second secret key memorized in the second secret key memory unit with the attribute value calculated by the attribute value calculating unit; a first encryption unit operable to encrypt the third secret key memorized in the third secret key memory unit with the second secret key transformed by the transforming unit; a second encryption unit operable to encrypt the first secret key memorized in the first secret key memory unit with the third secret key memorized in the third secret key memory unit; a third encryption unit operable to encrypt the digital production memorized in the digital production memory unit with the first secret key memorized in the first secret key memory unit; and an outputting unit operable to output the CRL memorized in the CRL memory unit, the third secret key encrypted by the first encryption unit, the first secret key encrypted by the second encryption unit and the digital production encrypted by the third encryption unit, to the recording medium or the transmission medium, and the decrypting device includes: an obtaining unit operable to obtain the encrypted digital production, an encrypted first secret key that is generated by encrypting the first secret key used for the encryption of the digital production, an encrypted second secret key that is generated by encrypting the second secret key used for the encryption of the first secret key and the CRL which is an information list for specifying a revoked public key certificate via the recoding medium or the transmission medium; a third secret key memory unit operable to memorize a third secret key specific to the decrypting device; an attribute value calculating unit operable to calculate an attribute value dependent on details of a CRL based on a CRL memorized in the CRL memory unit; a transforming unit operable to transform the third secret key memorized in the third secret key memory unit with the attribute value calculated in the attribute value calculating unit; a first decrypting unit operable to decrypt the encrypted second secret key obtained from the obtaining unit with the third secret key transformed by the transforming unit; a second decrypting unit operable to decrypt the encrypted first secret key obtained from the obtaining unit with the second secret key decrypted by the first decrypting unit; and a third decrypting unit operable to decrypt the encrypted digital production obtained from the obtaining unit with the first secret key decrypted by the second decrypting unit.
68. A copyright protection system is a system that transmits a digital production safely via a recording medium or a transmission medium, comprising : an encryption device that encrypts the digital production and outputs the digital production to the recording medium or the transmission medium; and a decrypting device that obtains the encrypted digital production via the recording medium or the transmission medium and decrypts the digital production, wherein the encryption device includes: a digital production memory unit operable to memorize the digital production; a first secret key memory unit operable to memorize a first secret key which is used for the encryption of the digital production; a second secret key memory unit operable to memorize a second secret key corresponding to a decrypting device that decrypts the encrypted digital production; a third secret key memory unit operable to memorize a third secret key which is used for the encryption of the first secret key. a CRL memory unit operable to memorize a CRL which is an information list that specifies a revoked public key certificate; a first encryption unit operable to encrypt the third secret key memorized in the third secret key memory unit with the second secret key memorized in the second secret key memory unit; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the CRL memorized in the CRL memory unit; a transforming unit operable to transform the third secret key memorized in the third secret key memory unit with the attribute value calculated by the attribute value calculating unit; a second encryption unit operable to encrypt the first secret key memorized in the first secret key memory unit with an attribute value transformed by the transforming unit; a third encryption unit operable to encrypt the digital production memorized in the digital production memory unit with the first secret key memorized in the first secret key memory unit; and an outputting unit operable to output the CRL memorized in the CRL memory unit, the third secret key encrypted by the first encryption unit, the first secret key encrypted by the second encryption unit and the digital production encrypted by the third encryption unit, to the recording medium or the transmission medium, and the decrypting device includes: an obtaining unit operable to obtain the encrypted digital production, an encrypted first secret key that is generated by encrypting the first secret key used for the encryption of the digital production, an encrypted second secret key that is generated by encrypting the second secret key used for the encryption of the first secret key and the CRL which is an information list for specifying a revoked public key certificate via the recoding medium or the transmission medium; a third secret key memory unit operable to memorize a third secret key specific to the decrypting device; a first decrypting unit operable to decrypt the encrypted second secret key obtained from the obtaining unit with the third secret key memorized in the third secret key memory unit; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the obtained CRL; a transforming unit operable to transform the second secret key decrypted by the first decrypting unit with the attribute value calculated by the attribute value calculating unit; a second decrypting unit operable to decrypt the encrypted first secret key obtained from the obtaining unit with the second secret key transformed by the transforming unit; and a third decrypting unit operable to decrypt the encrypted digital production obtained from the obtaining unit with the first secret key decrypted by the second decrypting unit.
69. A copyright protection system is a system that transmits a digital production safely via a recording medium or a transmission medium, comprising : an encryption device that encrypts the digital production and outputs the digital production to the recording medium or the transmission medium; and a decrypting device that obtains the encrypted digital production via the recording medium or the transmission medium and decrypts the digital production, wherein the encryption device includes: a digital production memory unit operable to memorize the digital production; a first secret key memory unit operable to memorize a first secret key which is used for the encryption of the digital production; a second secret key memory unit operable to memorize a second secret key corresponding to a decrypting device that decrypts the encrypted digital production; a third secret key memory unit operable to memorize a third secret key which is used for the encryption of the first secret key; a CRL memory unit operable to memorize a CRL which is an information list that specifies a revoked public key certificate; a first encryption unit operable to encrypt the third secret key memorized in the third secret key memory unit with the second secret key memorized in the second secret key memory unit; a second encryption unit operable to encrypt the first secret key memorized in the first secret key memory unit with the third secret key encrypted by the first secret key memory unit; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the CRL memorized in the CRL memory unit; a transforming unit operable to transform the first secret key memorized in the first secret key memory unit with the attribute value calculated by the attribute value calculating unit; a third encryption unit operable to encrypt the digital production memorized in the digital production memory unit with the first secret key transformed by the transforming unit; and an outputting unit operable to output the CRL memorized in the CRL memory unit, the third secret key encrypted by the first encryption unit, the first secret key encrypted by the second encryption unit and the digital production encrypted by the third encryption unit, to the recording medium or the transmission medium, and the decrypting device includes : an obtaining unit operable to obtain the encrypted digital production, an encrypted first secret key that is generated by encrypting the first secret key used for the encryption of the digital production, an encrypted second secret key that is generated by encrypting the second secret key used for the encryption of the first secret key and the CRL which is an information list for specifying a revoked public key certificate via the recoding medium or the transmission medium; a third secret key memory unit operable to memorize the third secret key specific to the decrypting device; a first decrypting unit operable to decrypt the encrypted second secret key obtained from the obtaining unit with the third secret key memorized in the first secret key memory unit; a second decrypting unit operable to decrypt the encrypted first secret key obtained from the obtaining unit with the second secret key decrypted by the first decrypting unit; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the obtained CRL; a transforming unit operable to transform the first secret key decrypted by the second decrypting unit with the attribute value calculated by the attribute value calculating unit; and a third decrypting unit operable to decrypt the encrypted digital production obtained from the obtaining unit with the first secret key transformed by the transforming unit.
70. A copyright protection system is a system that transmits a digital production safely via a recording medium or a transmission medium, comprising : an encryption device that encrypts the digital production and outputs the digital production to the recording medium or the transmission medium; and a decrypting device that obtains the encrypted digital production via the recording medium or the transmission medium and decrypts the digital production, wherein the encryption device includes: a digital production memory unit operable to memorize the digital production; a medium identification information memory unit operable to memorize a medium identification information which is used for an encryption of the digital production ; a first secret key memory unit operable to memorize a first secret key corresponding to a decrypting device that decrypts the encrypted digital production; a second secret key memory unit operable to memorize a second secret key which is used for the encryption of the medium identification information; a CRL memory unit operable to memorize a CRL which is an information list that specifies a revoked public key certificate; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the CRL memorized in the CRL memory unit; a transforming unit operable to transform the first secret key memorized in the first secret key memory unit with the attribute value calculated by the attribute value calculating unit; a first encryption unit operable to encrypt the second secret key memorized in the second secret key memory unit with the first secret key transformed by the transforming unit; a function transformation unit operable to transform by inputting the medium identification information memorized in the medium identification information unit and the second secret key memorized in the second secret key memory unit into a one-way function; a second encryption unit operable to encrypt the digital production memorized in the digital production memory unit with a function value calculated by the function transformation unit; and an outputting unit operable to output the CRL memorized in the CRL memory unit, the second secret key encrypted by the first encryption unit, the medium identification information memorized in the medium identification information memory unit, and the digital production encrypted by the third encryption unit, to the recording medium or the transmission medium, and the decrypting device includes: an obtaining unit operable to obtain the encrypted digital production, the medium identification information used for the encryption of the digital production, an encrypted first secret key that is generated by encrypting the first secret key used for the encryption of the medium identification information and the CRL which is an information list for specifying a revoked public key certificate via a recoding medium or a transmission medium ; a second secret key memory unit operable to memorize the second secret key specific to the decrypting device; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the obtained CRL; a transforming unit operable to transform the second secret key memorized in the second secret key memory unit with the attribute value calculated in the attribute value calculating unit; a first decrypting unit operable to decrypt the encrypted first secret key obtained from the obtaining unit with the second secret key transformed by the transforming unit; a function transformation unit operable to transform by inputting a medium identification information obtained from the obtaining unit with the first secret key decrypted by the first decrypting unit into a one-way function; and a second decrypting unit operable to decrypt the encrypted digital production obtained from the obtaining unit with the function value calculated by the function transformation unit.
71. A copyright protection system is a system that transmits a digital production safely via a recording medium or a transmission medium, comprising : an encryption device that encrypts the digital production and outputs the digital production to the recording medium or the transmission medium; and a decrypting device that obtains the encrypted digital production via the recording medium or the transmission medium and decrypts the digital production, wherein the encryption includes: a digital production memory unit operable to memorize the digital production; a medium identification information memory unit operable to memorize a medium identification information which is used for an encryption of the digital production; a first secret key memory unit operable to memorize a first secret key corresponding to a decrypting device that decrypts the encrypted digital production; a second secret key memory unit operable to memorize a second secret key which is used for the encryption of the medium identification information; a CRL memory unit operable to memorize a CRL which is an information list that specifies a revoked public key certificate; a first encryption unit operable to encrypt the second secret key memorized in the second secret key memory unit with the first secret key memorized in the first secret key memory unit; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the CRL memorized in the CRL memory unit; a transforming unit operable to transform the second secret key memorized in the second secret key memory unit with the attribute value calculated by the attribute value calculating unit; a function transformation unit operable to transform by inputting a medium identification information memorized in the medium identification information memory unit and the second secret key transformed by the transforming unit into a one-way function; a second encryption unit operable to encrypt the digital production memorized in the digital production memory unit with a function value calculated by the function transformation unit; and an outputting unit operable to output the CRL memorized in the CRL memory unit, the second secret key encrypted by the first encryption unit, the medium identification information memorized in the medium identification information memory unit, and the digital production encrypted by the third encryption unit, to the recording medium or the transmission medium, and the decrypting device includes: an obtaining unit operable to obtain the encrypted digital production, the medium identification information used for the encryption of the digital production, an encrypted first secret key that is generated by encrypting the first secret key used for the encryption of the medium identification information and the CRL which is an information list for specifying a revoked public key certificate via the recoding medium or the transmission medium; a second secret key memory unit operable to memorize the second secret key specific to the decrypting device; a first decrypting unit operable to decrypt the encrypted first secret key obtained from the obtaining unit with the second secret key memorized in the second secret key memory unit; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on an obtained CRL; a transforming unit operable to transform the first secret key decrypted by the first decrypting unit with the attribute value calculated by the attribute value calculating unit; a function transformation unit operable to transform by inputting the medium identification information obtained from the obtaining unit and the attribute value transformed by the transforming unit into a one-way function; and a second decrypting unit operable to decrypt the encrypted digital production obtained from the obtaining unit with the function value obtained from the function transformation unit.
72. A copyright protection system is a system that transmits a digital production safely via a recording medium or a transmission medium, comprising : an encryption device that encrypts the digital production and outputs the digital production to the recording medium or the transmission medium; and a decrypting device that obtains the encrypted digital production via the recording medium or the transmission medium and decrypts the digital production, wherein the encryption device includes: a digital production memory unit operable to memorize the digital production; a medium identification information memory unit operable to memorize a medium identification information which is used for the encryption of the digital production; a first secret key memory unit operable to memorize a first secret key corresponding to a decrypting device that decrypts an encrypted digital production; a second secret key memory unit operable to memorize a second secret key which is used for the encryption of the medium identification information; a CRL memory unit operable to memorize a CRL which is an information list that specifies a revoked public key certificate; a first encryption unit operable to encrypt the second secret key memorized in the second secret key memory unit with the first secret key memorized in the first secret key memory unit; a function transformation unit operable to transform by inputting a medium identification information memorized in the medium identification information memory unit and the second secret key memorized in the second secret key memory into a one-way function ; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the CRL memorized in the CRL memory unit; a transforming unit operable to transform a function value obtained from the function transformation unit with the attribute value calculated by the attribute value calculating unit; a second encryption unit operable to encrypt the digital production memorized in the digital production memory unit with a function value transformed by the function transformation unit; and an outputting unit operable to output the CRL memorized in the CRL memory unit, the second secret key encrypted by the first encryption unit, the medium identification information memorized in the medium identification information memory unit, and the digital production encrypted by the second encryption unit, to the recording medium or the transmission medium, and the decrypting device includes: an obtaining unit operable to obtain the encrypted" digital production, the medium identification information used for the encryption of the digital production, an encrypted first secret key that is generated by encrypting the first secret key used for the encryption of the medium identification information and the CRL which is an information list for specifying a revoked public key certificate via a recoding medium or a transmission medium; a second secret key memory unit operable to memorize the second secret key specific to the decrypting device; a first decrypting unit operable to decrypt the encrypted first secret key obtained from the obtaining unit with the second secret key memorized in the second secret key memory unit; a function transformation unit operable to transform by inputting the medium identification information obtained from the obtaining unit and the first secret key decrypted by the first decrypting unit into a one-way function; an attribute value calculating unit operable to calculate an attribute value dependent on details of the CRL based on the obtained CRL; a transforming unit operable to transform the function value obtained from the function transformation unit with the attribute value calculated in the attribute value calculating unit; and a second decrypting unit operable to decrypt the encrypted digital production obtained from the obtaining unit with the function value transformed by the transforming unit.
73. A cipher communication device that establishes a cipher communication with a partner device using a public key of the partner device, comprising : a memory unit operable to memorize a CRL which is an information list for specifying a revoked public key certificate; an obtaining unit operable to obtain a new CRL; a storage unit operable to compare a size of the obtained CRL with a size of the CRL memorized in the memory unit, and when the obtained CRL is larger in size, memorize the obtained CRL in the memory unit and update the CRL; and a communication unit operable to judge validity of the public key of the partner device referring to the CRL memorized in the memory unit, and upon confirmed that the public key is not revoked, establish the cipher communication with the partner device using the public key.
74. a cipher communication device that establishes a cipher communication with a partner device using a public key of the partner device, comprising : a memory unit operable to memorize a CRL which is an information list for specifying a revoked public key certificate; an obtaining unit operable to obtain a new CRL; a storage unit operable to compare a number of the certificate indicated in the obtained CRL with a number of the certificate indicated in the CRL memorized in the memory unit, and when the certificate indicated in the obtained CRL is the larger in number, memorize the obtained CRL to the memory unit and update the CRL; and a communication unit operable to judge a validity of the public key of the partner device referring to the CRL memorized in the memory unit, and upon confirmed that the public key is not revoked, establish the cipher communication with the partner device using the public key.
75. An encrypting method in an encryption device that encrypts a digital production and outputs the encrypted digital production to a recording medium or a transmission medium, the encrypting method includes:
(1) an encrypting step for repeating a chain encryption process, for a first secret key thorough an (n-l)th secret key, of encrypting the digital production using the first secret key out of n ( 2) secret keys and encrypting an (i- l)th secret key using an i (2 i n)th secret key; and (2) an outputting step for outputting the encrypted first secret key thorough the (n-l)th secret key to the recording medium and the transmission medium, wherein the chain encryption process using at least one of the first secret key through the nth secret key includes a first step for transforming the secret key, prior to the encryption, using an attribute value dependent on details of a CRL which is an information list for specifying a revoked public key certificate.
76. An encrypting method in an encryption device that encrypts a digital production and outputs the encrypted digital production to a recording medium or a transmission medium, the encrypting method includes:
(1) an encrypting step for repeating a chain encryption and transformation process, for a first secret key thorough an (n-l)th secret key, of transforming a medium identification information with a one-way function using the first secret key out of n ( 1) secret keys, encrypting the digital production using the transformed medium identification information, and in the case of n 2, encrypting an (i-l)th secret key using an i (2 i n)th secret key; and (2) an outputting step for outputting the encrypted first secret key thorough the (n-l)th secret key to the recording medium and the transmission medium, wherein the chain encryption or transformation process using at least one of the first secret key through the nth secret key includes a second step for (1) transforming the secret key, prior to the encryption, using an attribute value dependent on details of a CRL which is an information list for specifying a revoked public key certificate, or (2) transforming the medium identification information obtained by the transformation with the attribute value.
77. A decrypting method in a decrypting device that decrypts an encrypted digital production, the decrypting method includes:
(1) a first decrypting step for repeating a chain decrypting process, for n ( 2) encrypted secret keys, of obtaining the encrypted digital production, the n encrypted secret keys and a CRL which is an information list for specifying a revoked public key certificate via a recording medium or a transmission medium, and decrypting a first encrypted secret key out of the n encrypted secret keys using a pre-holding secret key, and further decrypting an encrypted second secret key with the obtained first secret key; and (2) a second decrypting step for decrypting the digital production with the nth secret key obtained by the final decrypting, wherein at least one of the decrypting processes using the first secret key through the nth secret key includes a third step for transforming the secret key used for the decrypting, prior to the decrypting, using an attribute value dependent on details of the CRL.
78. A decrypting method in a decrypting device that decrypts an encrypted digital production, the decrypting method includes: (1) a first decrypting step for repeating a chain decrypting process, for n ( 1) encrypted secret keys, of obtaining the encrypted digital production, a medium identification information, n ( 1) encrypted secret keys and a CRL which is an information list for specifying a revoked public key certificate via a recording medium or a transmission medium, decrypting a first secret keys using a pre-holding secret key, and in the case of n ( 2), decrypting an encrypted second secret key with the obtained first secret key; and
(2) a second decrypting step for transforming the medium identification information by a one-way function using the nth secret key used for the final decrypting, and decrypting the digital production with the transformed medium identification information, wherein at least one of the decrypting processes using the first secret key though the nth secret key and the transformation of the medium identification information includes a forth step for (1) transforming the secret key used for the decrypting or the transformation, prior to the decrypting or the transformation, using an attribute value dependent on details of the CRL, or (2) transforming the medium identification information obtained by the transformation using the attribute value.
79. A secret key generation method in a secret key generation device that outputs a secret key for decrypting to a decrypting device that decrypts an encrypted digital production, the secret key generation method includes:
(1) a decrypting step for repeating a chain decrypting process, for n ( 2) encrypted secret keys, of obtaining n ( 2) encrypted secret keys and a CRL which is an information list for specifying a revoked public key certificate via a recording medium or a transmission medium, decrypting a first encrypted secret key out of the n encrypted secret keys using a pre-holding secret key, and further decrypting an encrypted second secret key with the obtained first secret key; and
(2) an outputting step for outputting the nth secret key obtained by the final decrypting to the decrypting device, wherein at least one of the decrypting processes using the first secret key thorough the nth secret key includes a fifth step for transforming the secret key used for the decrypting, prior to the decrypting, using an attribute value dependent on details of the CRL.
80. A secret key generation method in a secret key generation device that outputs a secret key for decrypting to a decrypting device that decrypts an encrypted digital production, the secret key generation method includes :
(1) a decrypting step for repeating a chain decrypting process, for n ( 1) encrypted secret keys, of obtaining a medium identification information, the n ( 1) encrypted secret keys and a CRL which is an information list for specifying a revoked public key certificate via a recording medium or a transmission medium, decrypting a first encrypted secret key out of the n encrypted secret keys using a pre-holding secret key, and in the case of n 2, decrypting an encrypted second secret key with the obtained first secret key; and
(2) an outputting step for transforming the medium identification information by a one-way function using the nth secret key obtained by the final decrypting, and outputting the transformed medium identification information to the decrypting device, wherein at least one of the decrypting processes using the first secret key through the nth secret key and the transformation of the medium identification information includes a sixth step for (1) transforming the secret key used for the decrypting or the transformation, prior to the decrypting or the transformation, using an attribute value dependent on details of the CRL, or (2) transforming the medium identification information obtained by the transformation using the attribute value.
81. A program used for an encryption device that encrypts a digital production and outputs the digital production to a recording medium or a transmission medium, the program causing a computer to execute: a first step for transforming the secret key, prior to the encryption, using an attribute value dependent on details of a CRL which is an information list for specifying a revoked public key certificate; and a second step for (1) transforming the secret key, prior to the encryption, using an attribute value dependent on details of the CRL which is an information list for specifying a revoked public key certificate, or (2) transforming a medium identification information obtained by the transformation with the attribute value.
82. A program used for a decrypting device that obtains an encrypted digital production via a recording medium or a transmission medium and decrypts the encrypted digital production, the program causing a computer to execute: a third step for transforming the secret key used for decrypting, prior to the decrypting, using an attribute value dependent on details of a CRL which is an information list for specifying a revoked public key certificate; and a forth step for (1) transforming the secret key used for decrypting, prior to the decrypting, using an attribute value dependent on details of the CRL, or (2) transforming a medium identification information obtained by the transformation with the attribute value.
83. A program used for a secret generation device that outputs a secret key for decrypting an encrypted digital production to a decrypting device, the program casing a computer to execute: a fifth step for transforming the secret key used for decrypting, prior to the decrypting, using an attribute value dependent on details of a CRL which is an information list for specifying a revoked public key certificate; and a sixth step for (1) transforming the secret key used for decrypting, prior to the decrypting, using an attribute value dependent on details of the CRL, or (2) transforming a medium identification information obtained by the transformation with the attribute value.
PCT/JP2002/009245 2001-09-27 2002-09-11 An encryption device, a decrypting device, a secret key generation device,a copyright protection system and a cipher communication device WO2003030447A2 (en)

Priority Applications (7)

Application Number Priority Date Filing Date Title
KR10-2004-7004596A KR20040039443A (en) 2001-09-27 2002-09-11 An encryption device, a decrypting device, a secret key generation device, a copyright protection system and a cipher communication device
US10/490,346 US7542568B2 (en) 2001-09-27 2002-09-11 Encryption device a decrypting device a secret key generation device a copyright protection system and a cipher communication device
HU0401720A HUP0401720A2 (en) 2001-09-27 2002-09-11 An encryption device, a decrypting device, a secret key generation device, a copyright protection system and a cipher communication device
MXPA04002721A MXPA04002721A (en) 2001-09-27 2002-09-11 An encryption device, a decrypting device, a secret key generation device,a copyright protection system and a cipher communication device.
AU2002334409A AU2002334409A1 (en) 2001-09-27 2002-09-11 An encryption device, a decrypting device, a secret key generation device,a copyright protection system and a cipher communication device
EP02800230A EP1430641A2 (en) 2001-09-27 2002-09-11 An encryption device, a decrypting device, a secret key generation device,a copyright protection system and a cipher communication device
US12/431,148 US20090208007A1 (en) 2001-09-27 2009-04-28 Encryption device, a decrypting device, a secret key generation device, a copyright protection system and a cipher communication device

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
JP2001298414 2001-09-27
JP2001-298414 2001-09-27
JP2001374856 2001-12-07
JP2001-374856 2001-12-07

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/431,148 Division US20090208007A1 (en) 2001-09-27 2009-04-28 Encryption device, a decrypting device, a secret key generation device, a copyright protection system and a cipher communication device

Publications (2)

Publication Number Publication Date
WO2003030447A2 true WO2003030447A2 (en) 2003-04-10
WO2003030447A3 WO2003030447A3 (en) 2003-12-31

Family

ID=26623168

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2002/009245 WO2003030447A2 (en) 2001-09-27 2002-09-11 An encryption device, a decrypting device, a secret key generation device,a copyright protection system and a cipher communication device

Country Status (9)

Country Link
US (2) US7542568B2 (en)
EP (1) EP1430641A2 (en)
JP (1) JP2009044773A (en)
KR (1) KR20040039443A (en)
CN (1) CN100452699C (en)
AU (1) AU2002334409A1 (en)
HU (1) HUP0401720A2 (en)
MX (1) MXPA04002721A (en)
WO (1) WO2003030447A2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005136965A (en) * 2003-10-10 2005-05-26 Matsushita Electric Ind Co Ltd Encryption apparatus, decryption apparatus, secret key generation apparatus, and copyright protection system
US9036819B2 (en) 2008-07-17 2015-05-19 Canon Kabushiki Kaisha Broadcast receiving apparatus and control method thereof
US9349411B2 (en) 2002-07-16 2016-05-24 Digimarc Corporation Digital watermarking and fingerprinting applications for copy protection

Families Citing this family (55)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7730300B2 (en) * 1999-03-30 2010-06-01 Sony Corporation Method and apparatus for protecting the transfer of data
US7039614B1 (en) * 1999-11-09 2006-05-02 Sony Corporation Method for simulcrypting scrambled data to a plurality of conditional access devices
WO2003096339A2 (en) * 2002-05-09 2003-11-20 Matsushita Electric Industrial Co., Ltd. Authentication communication system, authentication communication apparatus, and authentication communication method
US7203844B1 (en) * 2002-06-20 2007-04-10 Oxford William V Method and system for a recursive security protocol for digital copyright control
US8438392B2 (en) 2002-06-20 2013-05-07 Krimmeni Technologies, Inc. Method and system for control of code execution on a general purpose computing device and control of code execution in a recursive security protocol
US20050249105A1 (en) * 2002-07-08 2005-11-10 Koninklijke Philips Electronics N.V. Data retention of integrated circuit on record carrier
US8572408B2 (en) * 2002-11-05 2013-10-29 Sony Corporation Digital rights management of a digital device
US7724907B2 (en) * 2002-11-05 2010-05-25 Sony Corporation Mechanism for protecting the transfer of digital content
CN1512357A (en) * 2002-12-30 2004-07-14 �ʼҷ����ֵ��ӹɷ����޹�˾ Method and system for increasing optical disc copy system extension property
CN1774688A (en) * 2003-04-17 2006-05-17 皇家飞利浦电子股份有限公司 Method and system for managing digital rights
AU2003244970A1 (en) * 2003-06-25 2005-01-04 Nokia Corporation Digital rights management
US20050049886A1 (en) * 2003-08-28 2005-03-03 Sbc Knowledge Ventures, L.P. System and method for managing digital rights and content assets
US7392381B2 (en) * 2004-04-13 2008-06-24 Intel Corporation Proactive forced renewal of content protection implementations
US8156339B2 (en) * 2004-07-21 2012-04-10 Sanyo Electric Co., Ltd. Method for transmission/reception of contents usage right information in encrypted form, and device thereof
US20090070883A1 (en) * 2004-09-17 2009-03-12 Mark Kenneth Eyer System renewability message transport
US8015613B2 (en) * 2004-09-17 2011-09-06 Sony Corporation System renewability message transport
US20060100965A1 (en) * 2004-11-10 2006-05-11 Nokia Corporation Digital content after-market broker system, method, apparatus and computer program
US8396213B2 (en) 2005-01-21 2013-03-12 Certicom Corp. Elliptic curve random number generation
KR20060107282A (en) * 2005-04-07 2006-10-13 엘지전자 주식회사 Data reproducing method, data recording/reproducing player and data transmitting method
KR100891323B1 (en) * 2005-05-11 2009-03-31 삼성전자주식회사 Method and apparatus to increase complexity of power analysis based on random point representation in binary field Elliptic Curve CryptographyECC
JP2007006380A (en) * 2005-06-27 2007-01-11 Toshiba Corp Information processing apparatus capable of receiving digital broadcasting program data and content protecting method in its apparatus
US7499552B2 (en) 2006-01-11 2009-03-03 International Business Machines Corporation Cipher method and system for verifying a decryption of an encrypted user data key
US7971062B1 (en) * 2006-04-12 2011-06-28 Oracle America, Inc. Token-based encryption key secure conveyance
US8050407B2 (en) * 2006-04-12 2011-11-01 Oracle America, Inc. Method and system for protecting keys
KR100781528B1 (en) * 2006-06-29 2007-12-03 삼성전자주식회사 Device and method for providing video stream with integrity
US7822207B2 (en) * 2006-12-22 2010-10-26 Atmel Rousset S.A.S. Key protection mechanism
EP2120227B1 (en) * 2007-01-19 2015-04-15 Mitsubishi Electric Corporation Cryptogram generating device, cryptogram communication system, and group parameter generating device
EP2119092A4 (en) * 2007-03-06 2012-02-22 William V Oxford Method and system for a recursive security protocol for digital copyright control
US8181038B2 (en) * 2007-04-11 2012-05-15 Cyberlink Corp. Systems and methods for executing encrypted programs
US20090180617A1 (en) * 2008-01-10 2009-07-16 General Instrument Corporation Method and Apparatus for Digital Rights Management for Removable Media
US8503679B2 (en) * 2008-01-23 2013-08-06 The Boeing Company Short message encryption
JP5079024B2 (en) * 2008-02-20 2012-11-21 三菱電機株式会社 Verification device, ciphertext decryption device, signature verification device, authentication device, encryption system, and computer program
JP5163178B2 (en) * 2008-02-25 2013-03-13 沖電気工業株式会社 Encryption key generation apparatus and method
EP2159653B1 (en) * 2008-09-02 2014-07-23 Siemens Aktiengesellschaft Method for assigning access authorisation to a computer-based object in an automation system, computer program and automation system
US8204220B2 (en) * 2008-09-18 2012-06-19 Sony Corporation Simulcrypt key sharing with hashed keys
WO2010054369A1 (en) * 2008-11-10 2010-05-14 Oxford William V Method and system for controling code execution on a computing device using recursive security protocol
US20100313273A1 (en) * 2009-06-06 2010-12-09 Walter Stewart Freas Securing or Protecting from Theft, Social Security or Other Sensitive Numbers in a Computerized Environment
US8751799B2 (en) * 2010-05-20 2014-06-10 Absio Corporation Method and apparatus for providing content
US8904189B1 (en) 2010-07-15 2014-12-02 The Research Foundation For The State University Of New York System and method for validating program execution at run-time using control flow signatures
PL2503518T3 (en) * 2011-03-22 2013-11-29 Kapsch Trafficcom Ag Method for validating a toll transaction
JP5159916B2 (en) * 2011-04-28 2013-03-13 株式会社東芝 host
US9049025B1 (en) * 2011-06-20 2015-06-02 Cellco Partnership Method of decrypting encrypted information for unsecure phone
WO2013089728A1 (en) * 2011-12-15 2013-06-20 Intel Corporation Method, device, and system for securely sharing media content from a source device
US9281948B2 (en) * 2012-02-09 2016-03-08 Microsoft Technology Licensing, Llc Revocation information for revocable items
JP5983727B2 (en) * 2012-03-09 2016-09-06 ソニー株式会社 Information processing apparatus, information storage apparatus, information processing system, information processing method, and program
JP2015511050A (en) 2012-03-20 2015-04-13 クリメニ テクノロジーズ, インコーポレイテッド Method and system for process working set isolation
KR101959738B1 (en) 2012-05-24 2019-03-19 삼성전자 주식회사 Apparatus for generating secure key using device ID and user authentication information
JP2013251609A (en) * 2012-05-30 2013-12-12 Sony Corp Information processing device, ic chip, and information processing method
JP2014048414A (en) * 2012-08-30 2014-03-17 Sony Corp Information processing device, information processing system, information processing method and program
JP6268616B2 (en) * 2013-12-16 2018-01-31 パナソニックIpマネジメント株式会社 Authentication system and authentication method
US9294276B2 (en) 2014-02-10 2016-03-22 International Business Machines Corporation Countering server-based attacks on encrypted content
US10313393B1 (en) 2017-11-16 2019-06-04 Capital One Services, Llc Systems and methods for securely pairing a transmitting device with a receiving device
EP3493461A1 (en) * 2017-12-01 2019-06-05 Nagravision S.A. Capability revocation
WO2020044667A1 (en) * 2018-08-28 2020-03-05 パナソニックIpマネジメント株式会社 Communication device, communication system, communication method and computer program
CN117155717B (en) * 2023-11-01 2024-01-05 北京中宏立达科技发展有限公司 Authentication method based on identification password, and cross-network and cross-domain data exchange method and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001011819A1 (en) * 1999-08-09 2001-02-15 Koninklijke Philips Electronics N.V. Updating a revocation list to foil an adversary
WO2001061591A1 (en) * 2000-02-15 2001-08-23 Sony Electronics, Inc. Method and apparatus for implementing revocation in broadcast networks

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5282249A (en) 1989-11-14 1994-01-25 Michael Cohen System for controlling access to broadcast transmissions
IL92310A (en) 1989-11-14 1994-05-30 News Datacom Ltd System for controlling access to broadcast transmissions
PT739560E (en) 1994-01-13 2001-12-28 Certco Inc CRYPTOGRAPHIC SYSTEM AND PROCESS WITH KEY WARRANTY CHARACTERISTICS
US6766450B2 (en) * 1995-10-24 2004-07-20 Corestreet, Ltd. Certificate revocation system
EP0840477B1 (en) * 1996-10-31 2012-07-18 Panasonic Corporation Secret key transfer method which is highly secure and can restrict the damage caused when the secret key is leaked or decoded
JPH10257047A (en) 1997-03-12 1998-09-25 Oki Electric Ind Co Ltd Authentication system and public key management system
JP3946808B2 (en) 1997-04-10 2007-07-18 日本電信電話株式会社 User information management device in authentication system
JP2000059323A (en) * 1998-02-13 2000-02-25 Matsushita Electric Ind Co Ltd Digital av data transmission unit, digital av data reception unit, digital av data transmission/reception system and medium
US6189096B1 (en) * 1998-05-06 2001-02-13 Kyberpass Corporation User authentification using a virtual private key
JP3331184B2 (en) 1999-03-30 2002-10-07 日本電信電話株式会社 Method, apparatus and recording medium for creating revocation certificate list in authentication system
JP4011792B2 (en) * 1999-06-16 2007-11-21 株式会社東芝 Recording method, reproducing method, recording apparatus, reproducing apparatus and recording medium
CN1304977C (en) * 1999-07-06 2007-03-14 索尼株式会社 Data providing system, device, and method
US6850914B1 (en) * 1999-11-08 2005-02-01 Matsushita Electric Industrial Co., Ltd. Revocation information updating method, revocation informaton updating apparatus and storage medium
JP3677001B2 (en) 1999-12-03 2005-07-27 三洋電機株式会社 Data distribution system and recording device used therefor
JP4174191B2 (en) * 2001-04-19 2008-10-29 日本電気株式会社 Copyright protection system and method
WO2003096339A2 (en) * 2002-05-09 2003-11-20 Matsushita Electric Industrial Co., Ltd. Authentication communication system, authentication communication apparatus, and authentication communication method
JP4129783B2 (en) * 2002-07-10 2008-08-06 ソニー株式会社 Remote access system and remote access method
WO2004086404A1 (en) * 2003-03-24 2004-10-07 Matsushita Electric Industrial Co. Ltd. Recording medium recording apparatus and reproducing apparatus
US7484090B2 (en) * 2003-10-10 2009-01-27 Panasonic Corporation Encryption apparatus, decryption apparatus, secret key generation apparatus, and copyright protection system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001011819A1 (en) * 1999-08-09 2001-02-15 Koninklijke Philips Electronics N.V. Updating a revocation list to foil an adversary
WO2001061591A1 (en) * 2000-02-15 2001-08-23 Sony Electronics, Inc. Method and apparatus for implementing revocation in broadcast networks

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9349411B2 (en) 2002-07-16 2016-05-24 Digimarc Corporation Digital watermarking and fingerprinting applications for copy protection
JP2005136965A (en) * 2003-10-10 2005-05-26 Matsushita Electric Ind Co Ltd Encryption apparatus, decryption apparatus, secret key generation apparatus, and copyright protection system
US9036819B2 (en) 2008-07-17 2015-05-19 Canon Kabushiki Kaisha Broadcast receiving apparatus and control method thereof

Also Published As

Publication number Publication date
MXPA04002721A (en) 2004-07-05
AU2002334409A1 (en) 2003-04-14
US20050021941A1 (en) 2005-01-27
WO2003030447A3 (en) 2003-12-31
US7542568B2 (en) 2009-06-02
US20090208007A1 (en) 2009-08-20
CN1596522A (en) 2005-03-16
CN100452699C (en) 2009-01-14
EP1430641A2 (en) 2004-06-23
HUP0401720A2 (en) 2005-07-28
JP2009044773A (en) 2009-02-26
KR20040039443A (en) 2004-05-10

Similar Documents

Publication Publication Date Title
US7542568B2 (en) Encryption device a decrypting device a secret key generation device a copyright protection system and a cipher communication device
US7484090B2 (en) Encryption apparatus, decryption apparatus, secret key generation apparatus, and copyright protection system
US6550011B1 (en) Media content protection utilizing public key cryptography
JP5200204B2 (en) A federated digital rights management mechanism including a trusted system
US6950941B1 (en) Copy protection system for portable storage media
US7224805B2 (en) Consumption of content
EP1372317B1 (en) Authentication system
KR101495535B1 (en) Method and system for transmitting data through checking revocation of contents device and data server thereof
JP4248208B2 (en) Encryption device, decryption device, secret key generation device, copyright protection system, and encryption communication device
US20040243814A1 (en) Digital work protection system, recording apparatus, reproduction apparatus, and recording medium
US20040228487A1 (en) Content reading apparatus
EP1759478A2 (en) Secure communication and real-time watermarking using mutating identifiers
US7647646B2 (en) Information input/output system, key management device, and user device
TW200423676A (en) System for identification and revocation of audiovisual titles and replicators
GB2435337A (en) Creating a Content Binding Vector (CBV) for validating content
CN101467156A (en) Improved access to domain
JP2004120736A (en) Group formation managing system, group managing device, and member device
JP2004072721A (en) Authentication system, key registering device and method
JP2004362547A (en) Method for constituting home domain through device authentication using smart card, and smart card for constituting home domain
US7693795B2 (en) Digital work protection system
WO2012172748A1 (en) Terminal device, server device, content recording control system, recording method, and recording permission/non-permission control method
JP2004519882A (en) Authentication method and data transmission system
JP2006246081A (en) Encryption processing apparatus, contents reproducing system, ic card, encryption processing method, encryption processing program, and recording medium
US20100122079A1 (en) Copyright protection system, reproduction apparatus and method
JP4461183B2 (en) Information recording medium and playback device

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BY BZ CA CH CN CO CR CU CZ DE DM DZ EC EE ES FI GB GD GE GH HR HU ID IL IN IS KE KG KP KR KZ LK LR LS LT LU LV MA MD MG MK MW MX MZ NO NZ OM PH PL PT RO SD SE SG SI SK SL TJ TM TN TR TT UA UG US UZ VC VN YU ZA ZM

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ UG ZM ZW AM AZ BY KG KZ RU TJ TM AT BE BG CH CY CZ DK EE ES FI FR GB GR IE IT LU MC PT SE SK TR BF BJ CF CG CI GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2002800230

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: PA/a/2004/002721

Country of ref document: MX

WWE Wipo information: entry into national phase

Ref document number: 640/CHENP/2004

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 1020047004596

Country of ref document: KR

WWE Wipo information: entry into national phase

Ref document number: 20028235851

Country of ref document: CN

WWP Wipo information: published in national office

Ref document number: 2002800230

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 10490346

Country of ref document: US

WWW Wipo information: withdrawn in national office

Ref document number: 2002800230

Country of ref document: EP