摘要:
To provide an apparatus, a recording medium and a method for effectively preventing unauthorized use of a content. A content containing broken data different from correct content member data is recorded on an information recording medium. Furthermore, transform data, as the correct member data, to be substituted for the broken data, and a fix-up table storing setting position information of the content are recorded on the information recording medium. During the content playback process, the transform data is substituted for the content member data in accordance with the fix-up table recorded on the information recording medium. With this arrangement, even if the encryption key corresponding to the encrypted content recorded on the information recording medium is leaked, an apparatus unable to acquire the transform data cannot play back the content. Unauthorized use of the content is thus controlled.
摘要:
A method and apparatus for processing information, method and apparatus for manufacturing an information recording medium, an information recording medium, and a computer program are provided. An information processing apparatus for playing back a content recorded on an information recording medium and includes a data transform processor performing a substitution process on content member data recorded on the information recording medium. The data transform processor substitutes transform data as substitute data for the content member data in accordance with a fix-up table holding recording position information of the transform data.
摘要:
A method and apparatus for processing information, method and apparatus for manufacturing an information recording medium, an information recording medium, and a computer program are provided. An information processing apparatus for playing back a content recorded on an information recording medium and includes a data transform processor performing a substitution process on content member data recorded on the information recording medium. The data transform processor substitutes transform data as substitute data for the content member data in accordance with a fix-up table holding recording position information of the transform data.
摘要:
To provide an apparatus, a recording medium and a method for effectively preventing unauthorized use of a content. A content containing broken data different from correct content member data is recorded on an information recording medium. Furthermore, transform data, as the correct member data, to be substituted for the broken data, and a fix-up table storing setting position information of the content are recorded on the information recording medium. During the content playback process, the transform data is substituted for the content member data in accordance with the fix-up table recorded on the information recording medium. With this arrangement, even if the encryption key corresponding to the encrypted content recorded on the information recording medium is leaked, an apparatus unable to acquire the transform data cannot play back the content. Unauthorized use of the content is thus controlled.
摘要:
A virtual machine can be implemented by anyone because the interface and other information necessary for implementation are publicly available. Therefore, it is possible that by implementing the virtual machine illegitimately, programs run thereon on will be made to operate illegitimately instead of legitimately. A program compares secret information held by the virtual machine with verification information held by the program itself. The program thereby verifies whether the virtual machine that runs the program is implemented legitimately, and is able to reject an illegitimate virtual machine.
摘要:
To provide an apparatus, a recording medium and a method for effectively preventing unauthorized use of a content. A content containing broken data different from correct content member data is recorded on an information recording medium. Furthermore, transform data, as the correct member data, to be substituted for the broken data, and a fix-up table storing setting position information of the content are recorded on the information recording medium. During the content playback process, the transform data is substituted for the content member data in accordance with the fix-up table recorded on the information recording medium. With this arrangement, even if the encryption key corresponding to the encrypted content recorded on the information recording medium is leaked, an apparatus unable to acquire the transform data cannot play back the content. Unauthorized use of the content is thus controlled.
摘要:
A virtual machine can be implemented by anyone because the interface and other information necessary for implementation are publicly available. Therefore, it is possible that by implementing the virtual machine illegitimately, programs run thereon on will be made to operate illegitimately instead of legitimately. A program compares secret information held by the virtual machine with verification information held by the program itself. The program thereby verifies whether the virtual machine that runs the program is implemented legitimately, and is able to reject an illegitimate virtual machine.
摘要:
To provide an apparatus, a recording medium and a method for effectively preventing unauthorized use of a content. A content containing broken data different from correct content member data is recorded on an information recording medium. Furthermore, transform data, as the correct member data, to be substituted for the broken data, and a fix-up table storing setting position information of the content are recorded on the information recording medium. During the content playback process, the transform data is substituted for the content member data in accordance with the fix-up table recorded on the information recording medium. With this arrangement, even if the encryption key corresponding to the encrypted content recorded on the information recording medium is leaked, an apparatus unable to acquire the transform data cannot play back the content. Unauthorized use of the content is thus controlled.
摘要:
An information processor includes a data processing section that executes a processing of storing subsequently generated data, which is subsequently generated or acquired using information read from an information recording medium, onto a storage unit. The data processing section is configured to execute a processing of storing onto the storage unit encrypted subsequently generated data as encrypted data that is encrypted with a unit key as an encryption key corresponding to a content management unit to which the subsequently generated data belongs, and execute a processing of acquiring an encrypted bind unit key and storing the encrypted bind unit key onto the storage unit, the encrypted bind unit key being encrypted data of a bind unit key including as its constituent data the unit key and one of key information acquired from the information processor and identification information acquired from the information recording medium.
摘要:
To provide a configuration in which a unit classification number corresponding to a content playback path is set based on various units. A unit classification number defining a playback path of content including encrypted data having different variations generated by encrypting a segment portion which forms the content by using a plurality of segment keys and encrypted content generated by encrypting a non-segment portion by a unit key is set based on various units, such as a content management unit and an index. In a CPS unit key file storing key generating information concerning CPS units as content management units, settings of unit classification numbers are indicated. Based on the CPS unit key file, a unit classification number to which content to be played back belongs can be obtained.