摘要 |
<p><P>PROBLEM TO BE SOLVED: To prevent the use of contents even in the illicit movement or duplication thereof. <P>SOLUTION: In steps S1 to S4, the absolute file name of the contents to be protected is designated, a common key Kb for encrypting the contents is designated, and the contents are encrypted by use of this key. In step S5, the ID of a contents management system and the absolute file name are encrypted by use of an encryption key Ke, whereby contents management information is generated. In step S6, an encryption key Kd for encrypting a decode key Kc for decoding the contents is generated on the basis of the generated content management information, and the decode key Kc is encrypted by use of this key. In steps S7 and S8, the encrypted contents and decode key Kc and the generated contents management information are capsulated and stored. According to this, the illicit use of the contents can be prevented. <P>COPYRIGHT: (C)2003,JPO</p> |