摘要:
When the total number of copies of requested content does not exceed its upper limit value, and when bilateral authentication with a partner to be communicated is successful, encrypted content (Kc[C]) and information (KT1[Kc]) used for decrypting the encrypted contents, which are encrypted using first shared information (KT1) generated by bilateral authentication, are transferred to the partner, thus updating the total number of copies of the transferred content. First data, used to erase information (KT1, Kc, C) that is recorded on the recording medium and is used for decrypting content which is recorded on the recording medium and is requested to erase, is encrypted using second shared information (KT3) generated by bilateral authentication, and the encrypted first data is transferred to the partner. When second data, which is encrypted using third shared information (KT4) generated by another bilateral authentication and is used in rewrite in the partner, is transferred from the partner, the transferred second data is decrypted using the third shared information, and the decrypted second data is compared with the first data (r1) to confirm if the information used for decrypting the content recorded on the recording medium has been erased, thus updating the total number of copies of content which is requested to erase.
摘要:
When the total number of copies of requested content does not exceed its upper limit value, and when bilateral authentication with a partner to be communicated is successful, encrypted content (Kc[C]) and information (KT1[Kc]) used for decrypting the encrypted contents, which are encrypted using first shared information (KT1) generated by bilateral authentication, are transferred to the partner, thus updating the total number of copies of the transferred content. First data, used to erase information (KT1, Kc, C) that is recorded on the recording medium and is used for decrypting content which is recorded on the recording medium and is requested to erase, is encrypted using second shared information (KT3) generated by bilateral authentication, and the encrypted first data is transferred to the partner. When second data, which is encrypted using third shared information (KT4) generated by another bilateral authentication and is used in rewrite in the partner, is transferred from the partner, the transferred second data is decrypted using the third shared information, and the decrypted second data is compared with the first data (r1) to confirm if the information used for decrypting the content recorded on the recording medium has been erased, thus updating the total number of copies of content which is requested to erase.
摘要:
According to this invention, in reproducing data recorded on a recording medium (1), reproduction of the data is limited on the basis of the distribution order, regional limitations such as different principles, different values, and regulation of morals, and time limitations which are recorded on the recording medium (1). Accordingly, when data recorded on the recording medium (1) is reproduced, reproduction of the data can be limited based on limitations recorded on the recording medium (1).
摘要:
In an A/D converter in which a first comparator A/D converter for providing the most significant bits of a digital output and a second comparator A/D converter for providing the least significant bits of the digital output are cascaded, a switching circuit is provided between the first A/D converter and the second AID converter. This switching circuit is responsive to the comparison between an analog input voltage and first comparison reference voltages in the first AID converter to apply two adjacent first reference voltages between which the analog input voltages lies to both ends of a voltage dividing circuit network of the second A/D converter to thereby provide second comparison reference voltages. In the second A/D converter, the second comparison reference voltages are compared with the analog input voltage by comparators, to provide the least significant bits of a digital output.
摘要:
A lighting control system (1) performs a lighting control on slave lamps (30A to 30F) under the control of a master lamp (20A and 20B) communicating with and connected to a management apparatus (10). The master lamp (20A or 20B) includes an adding unit (24a) that adds the slave lamps (30A to 30F) placed under the control of the other master lamp (20A or 20B) to the slave lamps (30A to 30F) under its own control, when the other master lamp (20A or 20B) fails. The master lamp (20A and 20B) includes a lighting control unit (24b) that performs the lighting control on the slave lamps (30A to 30F), based on a command relating to the lighting control, which is received from the management apparatus (10).
摘要:
A revocation list is registered a public ROM area (132). The revocation list designates at least one electronic device in which use of the storage medium (13) by the designated electronic device is to be revoked. A controller (130) receives from the electronic device (LCM or PD) which attempts to access, identification information indicative of the electronic device (LCM or PD), and checks whether identification information corresponding to the received identification information is contained in the revocation list, thereby determining whether or not use of the storage medium (13) by the electronic device (LCM or PD) which attempts to access should be revoked.
摘要:
An information storage medium (1) has tracks in which information is recorded. The tracks are formed as a groove section (2) and a land section (3). The groove section (2) has a synchronous structure in which wobbles (2a) and (2b) formed on both walls of the groove section (2) are not displaced from each other in the circumferential direction of the medium, and the land section (3) has an asynchronous structure in which wobbles formed on both sides of the land section (3) are displaced from each other. A good signal is reproduced from each of the groove and land sections.