Abstract:
In a process for manufacturing an information recording medium, a configuration is provided in which strict information management and an information recording medium manufacturing process are realized. In a configuration in which master data as original data of recording data for an information recording medium is generated and recording data for the information recording medium is generated on the basis of the master data, master data containing a dummy data area in a partial area of the master data is generated, and the dummy data area is identified and a process for setting significant information is performed on the basis of the stored information of an auxiliary file. Therefore, it is not necessary to obtain data of significant information when the master data is to be generated, and it becomes possible to generate the master data without obtaining specific information, such as an encrypted key block.
Abstract:
A configuration capable of performing the using management of each of contents divided at units, strictly and efficiently. CPS units divided from storage contents of an information recording medium are set, and unit keys are made to correspond to the individual CPS units, thereby to encrypt and record the data configuring the individual units. At a reproduction time, the unit keys are created and applied for a data processing. As the creation information of the unit keys, there are applied a copy/reproduce control information (CCI) to be set to correspond to the CPS units, and a contents hash or a hash value based on the CPS unit configuring data. By this configuration, it is possible to realize the tamper protection against the CCI and CPS unit configuring data and the valid contents using configuration.
Abstract:
PROBLEM TO BE SOLVED: To provide a configuration that enables the source of illegally distributed content to be verified from the content.SOLUTION: A sub image obtained by recording identification information of a content distribution client as, for example, a digital watermark in image data composed of only a partial area in image data, and a main image obtained by deleting an image signal in the sub image area or replacing the signal with a dummy signal are generated, and the sub image and the main image are provided to a client. Further, management information in which the identification information recorded in the sub image is associated with client information of a content provision destination is generated and managed. When illegally distributed content is found, identification information recorded in a sub image included in the illegally distributed content is analyzed and collated with registration data of the management information to determine the distribution source.
Abstract:
PROBLEM TO BE SOLVED: To provide a configuration which can examine the generation source based on improperly distributed content.SOLUTION: Plural digital watermarking record blocks obtained by embedding digital watermarking data into blocks as segment data of content are combined, and content in which a different digital watermarking data sequence is set in units of distribution processing for a client is created and provided to the client. The digital watermarking data sequence of the content to be provided to the client is set so as to include a unique ID which is a unique identifier in units of distribution processing, a message authentication code (MAC) for the unique ID, and an error correction code (ECC) for (unique ID+MAC). Thereby, it is possible to analyze improperly distributed content, read the digital watermarking data sequence, obtain the unique ID, and specify the distribution source.
Abstract:
PROBLEM TO BE SOLVED: To provide a configuration for controlling writing or reading of data for an access restriction area set in a medium.SOLUTION: An information processing device comprises: a storage unit having a protected area which is a data recording area where access is restricted; and a data processing unit which inputs an access request to the protected area from an access request device to perform determination processing of access permission. The data processing unit verifies a device certificate input from the access request device and determines access permission to the protected area based on access control information recorded in the device certificate. For example, based on access control information of each segment area unit of the protected area, the permission of writing or reading of data for each of the segment areas of the protected area is determined.
Abstract:
PROBLEM TO BE SOLVED: To provide a device and method for enabling a copying process that limits a data attribute used to permit copying in a data copying process among media.SOLUTION: The data processing section of an information processing device that performs the copying process in which the recorded data of first media is recorded to second media performs the process such that the section refers to selection information contained in information received from a management server, selects from the first media a copy unit that has a data attribute, such as sound and subtitle, defined as copy permission data in the selection information. Alternatively, the data processing section performs the process in which an attribute file containing selection information defining the data attribute of the copy permission data is formed and the formed attribute file is recorded onto the second media. The reproduction of copy data is limited to data that has a specific attribute.
Abstract:
PROBLEM TO BE SOLVED: To provide a device for effectively preventing unauthorized use of content, and to provide a recording medium and method. SOLUTION: Content including broken data different from proper content configuration data is recorded in the information recording medium. Conversion data as the proper content configuration data to be replaced by the broken data and a conversion table storing set position information with respect to content of the conversion data are stored in the information recording medium. In a content reproduction process, the content configuration data is replaced by the conversion data in accordance with the conversion table recorded in the information recording medium. Even if there is leakage of an encryption key corresponding to encrypted content recorded in the information recording medium, the content is not reproduced in a device capable of acquiring the conversion data, and unauthorized use of the content is prevented. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To prevent unauthorized use of content by determining propriety of reproduction of content based on the decision of validity of an IC recorder which records ID in a disk. SOLUTION: An information processor acquires an ID recorder certificate including the equipment ID of the ID recorder which has recorded the ID in the disk and an ID recorder black list from the disk, and decides whether or not the equipment ID recorded in the ID recorder certificate is registered in the ID recorder black list, and further compares the issue date of the ID reorder certificate with the issue date of the ID recorder black list or an equipment invalidation date, and decides validity of the ID recorder. The reproduction of the disk recording content is stopped based on a decision that the ID recorder is the unauthorized equipment. Thus, it is possible to prevent the use of the content stored in the disk created by the unauthorized ID recorder. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To achieve content copy between media to which the recording program of a disk is applied by making a processing request to which an API is applied between a plurality of data processing parts. SOLUTION: In a content copy processing configuration between media, a program read from a recording medium in which content and a program (BD-J application) are recorded is executed by a first data processing part (BD-JVM), and the acquisition processing of copy permission information from a management server is performed, and a second data processing part (AACS layer) is requested to execute part of processing. The BD-JVM selectively applies the plurality of API defining the processing, and makes the second data processing part execute the data processing. Thus, it is possible to provide the program (BD-J application) to the user as free setting corresponding to the content. COPYRIGHT: (C)2010,JPO&INPIT