摘要:
Sub-trees separated according to the data processing capability of a device are defined in a key tree in which keys are assigned to the roots, nodes, and leaves which are devices of a tree. A management entity of each sub-tree creates a sub make-effective key block effective in the entity. A key issuing center creates a make-effective key block decodable only by an entity having common capability according to the capability information on the entity. Each entity manages the partia trees (sub-trees) of the key tree, creates a sub make-effective key block according to only the nodes of the sub-trees or the keys corresponding to the leaves, and creates a make-effective key block decodable only by the selected entity by using the sub make-effective key block. Thus, a make-effective key block can be created in accordance with the data processing capability of a device and distributed, and the key tree hierarchical structure can be dividedly managed.
摘要:
A data transmitter which improves the safety of the transmission using an enciphering key of a decoding key and improves the safety against the leakage of the enciphered transmission data. A large capacity transmission line (152) such as a satellite transmission line through which large capacity data are transmitted and a small capacity transmission line (156) such as a public telephone line which transmits an enciphering key, a decoding key or information for generating these keys are provided. An enciphering session key (107) is generated by using a work key and the address of the receiver on the receiving side. A decoding session key (108) is generated by using the own address and the work key. The work key is, preferably, enciphered and transmitted on the small capacity transmission line (156). In a transmitter (101), not only the data (105) to be transmitted are enciphered by using the enciphering session which is thus converted as described above, but also the transmission control information such as the address data are added to the data (105) and transmitted to a receiver (102) through the large capacity transmission line (152). The enciphered data (110) are decoded by using the decoding session keys (108), which is converted as described above.
摘要:
A system and a method for realizing authorized use of a content while preventing false use of a content by rewriting right data. Right data including information on the content use limitation and DRM data including data on an encryption content key are recorded on a digital data recording medium. An integrity check value (ICV) for the DRM data is stored in a recordable / reproducible area (protected area) through a dedicated IC of a data recording/reproducing method different for an ordinary data recording/reproducing method. A key used for creating a key for ICV creation verification is created by EKB distribution by key distribution configuration of tree structure. Consequently, false use of a content by alteration of right data is prevented.
摘要:
An information processing system and method for realizing an efficient processing by using an enabling key block (EKB) of a categorized tree structure. A path constituting a key tree having sub-trees sorted by category and managed by a category entity is selected, and an EKB composed of encrypted data on an upper-level key encrypted by a lower-level key on the selected path is created and provided to a device. A state change due to, e.g., a revocation in a category tree where an EKB defined in an EKB type definition list is processable is reported to an EKB use entity. An EKB requester can always carry out a processing on the basis of the latest EKB.
摘要:
Protocol for mutual authentication and for sharing a plurality of encryption keys is practiced between a CPU (12) on a data transmitter (10) side and a CPU (22) on a data receiver (20) side prior to data transmission. The data transmitter (10) encrypts data which requires assurance of a transmission band with a first encryption key by the CPU (12) and transmits it through an input/output interface (16) in a first transmission mode. The data transmitter (10) further encrypts related data concerning the above mentioned data with a second encryption key through the input/output interface (16) in a second transmission mode. The data receiver (20) decrypts the data which requires the assurance of the transmission band and is received through an input/output interface (24) in the first transmission mode with the first code key and decrypts the related data which are received through the input/output interface (24) in the second transmission mode with the second code key.
摘要:
A block key for ciphering block data by using ATS added depending on the arrival time of a transport packet constituting a transport stream is created. Since the ATS is random data depending on the time, a unique key different with block can be created, thereby enhancing the strength against cipher analysis. The block key is created by combining the ATS and keys unique to the device and the recording medium such as the master key, disk unique key, and title unique key. Since the block key is created using the ATS, no areas on the recording medium for storage of a ciphering key for each block is required.
摘要:
An encrypting/decrypting LSI incorporates an LSI key common to other devices, and a ROM holds a device key unique to the device. The encrypting/decrypting LSI reads out the device key stored in the ROM, generates a data key unique to the device from the device key and the incorporated LSI key, and encrypts/decrypts data utilizing that data key. Unauthorized copy of data can be prevented while avoiding a cost increase of an information processor if possible.
摘要:
Partial data is verified by checking a partial check value used as a check value for a partial data set of a content, and thereby the whole data set is verified by checking a check value for verifying the partial check values used for verifying the partial check value set where partial check values are combined.
摘要:
An effective key block (EKB) used for key distribution structure of tree structure is re-structured to a simplified two-branch or multi-branch tree in which a decodable end node or leaf is at the lowest layer so as to create a re-structured layered tree according to only a key corresponding to the node or leaf of the re-structured layered tree. A tag as identification data about the tree position of an encryption key stored in the EKB is stored. In the tag, not only the position identification but data for judging if encryption key data is present in the EKB is stored. The amount of data in the EKB is greatly reduced and the decoding by a device is simplified. Thus, providing an information processing system and method enabling reduction of the amount of data in an Effective key block (EKB) used for an encryption key structure of tree structure.