Information processing apparatus, content information management method and computer program
First Claim
1. A method of providing content to a terminal device in a network, the method comprising:
- storing, in memory, a first content encrypted by a first content key, the first content key encrypted by a first network key, a second content encrypted by a second content key, and the second content key encrypted by the first network key;
storing, in a network key storage, the first network key, wherein the first network key is shared with the terminal device;
receiving a second network key as an update of the first network key, wherein the second network key is shared with the terminal device;
receiving a request for the first content;
performing a key update triggered by the request, the key update comprising;
decrypting the first content key with the first network key;
encrypting the decrypted first content key with the second network key;
decrypting the second content key with the first network key;
encrypting the decrypted second content key with the second network key; and
storing, in the memory, the second content key encrypted by the second network key; and
sending the first content encrypted by the first content key and the first content key encrypted by the second network key to the terminal device in response to the request.
1 Assignment
0 Petitions
Accused Products
Abstract
A content providing server connected to a home network or the like is configured in such a way as to store a content key, which is encrypted by a network key shared by network-connected devices and appropriately updated, in a storage together with encrypted content, and as to hold a network key table in which all network keys including all pre-update network keys, which are being applied to encrypted content keys, are registered and stored. This server performs a key changing operation of changing a content key, which is encrypted by a pre-update network key, to an encrypted key, to which an updated network key is applied, only when needed, for example, at an occurrence of utilization of the content. Consequently, this configuration prevents key changing operations from being wastefully performed. Thus, the processing load on the server is alleviated.
15 Citations
16 Claims
-
1. A method of providing content to a terminal device in a network, the method comprising:
-
storing, in memory, a first content encrypted by a first content key, the first content key encrypted by a first network key, a second content encrypted by a second content key, and the second content key encrypted by the first network key; storing, in a network key storage, the first network key, wherein the first network key is shared with the terminal device; receiving a second network key as an update of the first network key, wherein the second network key is shared with the terminal device; receiving a request for the first content; performing a key update triggered by the request, the key update comprising; decrypting the first content key with the first network key; encrypting the decrypted first content key with the second network key; decrypting the second content key with the first network key; encrypting the decrypted second content key with the second network key; and storing, in the memory, the second content key encrypted by the second network key; and sending the first content encrypted by the first content key and the first content key encrypted by the second network key to the terminal device in response to the request. - View Dependent Claims (2, 3, 4, 5, 6, 13, 14)
-
-
7. A non-transitory computer-readable medium having tangibly embodied thereon program instructions, which, when executed by a processor, cause the processor to perform a method of providing content to a terminal device in a network, the method comprising:
-
storing, in memory, a first content encrypted by a first content key, the first content key encrypted by a first network key, a second content encrypted by a second content key, and the second content key encrypted by the first network key; storing, in a network key storage, the first network key, wherein the first network key is shared with the terminal device; receiving a second network key as an update of the first network key, wherein the second network key is shared with the terminal device; receiving a request for the first content; performing a key update triggered by the request, the key update comprising; decrypting the first content key with the first network key; encrypting the decrypted first content key with the second network key; decrypting the second content key with the first network key; encrypting the decrypted second content key with the second network key; and storing, in the memory, the second content key encrypted by the second network key; and sending the first content encrypted by the first content key and the first content key encrypted by the second network key to the terminal device in response to the request. - View Dependent Claims (8, 9, 10, 11, 12, 15, 16)
-
Specification