MANAGING COPY PROTECTION INFORMATION OF ENCRYPTED DATA
First Claim
1. A method for managing copy protection information, the method comprising:
- reading a first key managed in a drive or an application for decrypting copy protection information and checking validity of the first key using a second key;
reading the copy protection information and decrypting the copy protection information using the first key; and
decrypting encrypted data using the copy protection information, wherein the first key is managed in a drive or an application for decrypting the copy protection information and the second key is used to check the validity of the first key.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for managing copy protection information of a recording medium is disclosed. A data stream encrypted using copy protection information is recorded in a data area of an optical disc such as a write once optical disc or a rewritable optical disc, while the copy protection information and a drive ID are recorded together in a key locker of the optical disc. When a data stream of an optical disc is reproduced, reading and decryption of the copy protection information is selectively performed depending on whether the drive ID recorded in the key locker and a drive ID managed in an optical disc drive, into which the optical disc is inserted, are identical. This prevents contents such as broadcast programs recorded in an optical disc from being illegally duplicated.
98 Citations
3 Claims
-
1. A method for managing copy protection information, the method comprising:
-
reading a first key managed in a drive or an application for decrypting copy protection information and checking validity of the first key using a second key;
reading the copy protection information and decrypting the copy protection information using the first key; and
decrypting encrypted data using the copy protection information, wherein the first key is managed in a drive or an application for decrypting the copy protection information and the second key is used to check the validity of the first key.
-
-
2. A device for managing copy protection information, the device comprising:
-
a calculation unit adapted to check validity of a first key using a second key, and to decrypt the copy protection information using the first key; and
a data processing unit adapted to decrypt encrypted data using the copy protection information, wherein the first key is managed in a drive or an application for decrypting the copy protection information and the second key is used to check the validity of the first key.
-
-
3. A computer readable recording medium recording software to perform a method for managing copy protection information, the method comprising:
-
reading a first key managed in a drive or an application for decrypting copy protection information and checking validity of the first key using a second key;
reading the copy protection information and decrypting the copy protection information using the first key; and
decrypting encrypted data using the copy protection information, wherein the first key is managed in a drive or an application for decrypting the copy protection information and the second key is used to check the validity of the first key.
-
Specification