Copyright information management method
A technology for information management and information conversion, which is applied in image communication, electronic digital data processing, television, etc., and can solve problems such as the inability to fully reflect the copyright owner's intentions.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0042] FIG. 1 is a block diagram showing the configuration of a rights information management device according to a first embodiment of the present invention. The right information management device 10 shown in FIG. 1 includes a central processing unit (CPU) 12 , an encryption and decryption circuit 14 and a storage medium input / output interface unit 16 . A portable storage medium 20 is removably connected to the storage medium input / output interface unit 16 . The storage medium 20 is, for example, a secure digital memory card.
[0043]The central processing unit 12 controls the encryption and decryption circuit 14 and the storage medium input interface unit 16 . The storage medium I / O interface section 16 reads data from the storage medium 20 and outputs the information to the central processing unit 12 or the encryption and decryption circuit 14, and writes the data received from the central processing unit 12 or the encryption and decryption circuit 14 into the storage med...
no. 2 example
[0059] FIG. 5 is a block diagram showing a structure of a storage medium 220 and an example of information stored in the storage medium 220 in the second embodiment. In this embodiment, the storage medium 220 is used instead of the storage medium 20 in FIG. 1 . The storage medium 220 includes a normal area 222 and an authentication area 24 . The normal area 222 stores encrypted content 232 and encrypted right information conversion information 234 , and the authentication area 24 stores encrypted right information 36 . For example, the CPU 12 stores encrypted right information 36 in the authentication area 24 , and stores encrypted content 232 and encrypted right information conversion information 234 in the normal area 222 .
[0060] FIG. 6 is an explanatory diagram showing an example of encrypted right information conversion information 234 in FIG. 5 . The encrypted right information conversion information 234 is information obtained by encrypting the right information con...
no. 3 example
[0068] FIG. 8 is a block diagram showing a structure of a storage medium 320 according to the third embodiment and an example of information stored in the storage medium 320 . In this embodiment, the storage medium 320 is used instead of the storage medium 20 in FIG. 1 . The storage medium 320 includes a normal area 322 and an authentication area 24 . The normal area 322 stores encrypted content 232 and right information conversion information 334 , and the authentication area 24 stores encrypted right information 36 . For example, the CPU 12 stores encrypted right information 36 in the authentication area 24 , and stores encrypted content 232 and right information conversion information 334 in the normal area 322 .
[0069] FIG. 9 is an explanatory diagram showing an example of the right information conversion information 334 in FIG. 8 . As shown in FIG. 9, the rights information conversion information 334 is mainly different from the rights information conversion informati...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 