摘要:
A recording or reproduction apparatus is provided which utilizes copyright information in operations to record content data onto a recording medium or reproduce content data from the recording medium. Copyright information for the contents includes information identifying an input source of the content data. The information identifying an input source is stored in the recording medium along with the content data. When the contents are reproduced from the recording medium, the input source information is acquired and used as a basis for determining whether the contents can be reproduced and output. Thus, it is possible to impose an output restriction on an operation to reproduce the contents in accordance with the input source.
摘要:
A data processing system, recording device, data processing method and program providing medium are provided to execute authentication processing and content storing processing between apparatuses. Program localization is employed to restrict access to program content. A plurality of key blocks store key data for authentication processing. Key block designation information is set in a recorder/reproducer, which is configured for executing authentication processing with the recording device by designating a key block. The recorder/reproducer can set a key block for each product, model or the like. In addition, data stored according to a selected key block cannot be utilized in a recorder/reproducer in which a different key block is set. Furthermore, an encryption processing controlling section of a recording device executes control in accordance with a pre-defined setting sequence. Furthermore, an illegal instrument that has not completed the authentication processing can be prevented from utilizing program content.
摘要:
A security module is provided in a data recording medium, data to be written to the data recording medium is encrypted with an content key different from one data to another, and the content key is safely stored in the security module. Also, the security module makes a mutual authentication using the public-key encryption technology with a drive unit to check that the counterpart is an authorized (licensed) unit, and then gives the content key to the counterpart, thereby preventing data from being leaked to any illegal (unlicensed) unit. Thus, it is possible to prevent copyrighted data such as movie, music, etc. from being copied illegally (against the wish of the copyrighter of the data).
摘要:
An information processing system and method are disclosed in which information processing is performed using an enabling key block (EKB) in association with a tree structure including category subtrees. A key tree is produced, which include subtrees that are grouped in accordance with categories and are managed by category entities. The EKB includes data produced by selecting a path in the key tree and encrypting a higher-level key in the selected path using a lower-level key in the selected path. The EKB is then provided to a device. A requester, which requests production of the EKB, may produce a root key or may request a key distribution center (KDC) to produce a root key. If the (KDC) produces the EKB, it may also request a category entity to produce a sub-EKB.
摘要:
An information processing device, information processing method and a recording medium are provided. Storage included in the information processing device is operable to store a node key and a leaf key, the leaf key being unique to the information processing device and the node key being unique to each node of a hierarchical network of nodes having a hierarchical tree structure. A decryption processor performs decryption processing to detect whether an encrypted decryption key for decrypting encrypted data is stored in at least one of on the information processing device or on a recording medium. When the encrypted decryption key is detected, the decryption processor is operable to calculate the decryption key by decrypting the encrypted decryption key. However, when the encrypted decryption key is not detected, the decryption processor is operable to calculate the decryption key by decrypting a key block using one of the one or more node keys stored in the storage and the leaf key stored in the storage. The calculated decryption key may then be encrypted and stored by the decryption processor on at least one of the recording medium or the memory.
摘要:
Prior to data transmission, a protocol for performing mutual authentication and sharing a plurality of encryption keys is executed between a CPU 12 on the side of a data transmission apparatus 10 and a CPU 22 on the side of a data receiving apparatus 20. The data transmission apparatus 10 causes the CPU 12 to encrypt data requiring the assurance of a transmission band by a first encryption key and to transmit the data in a first transmission mode via an input/output interface 16, and also to encrypt related data relating to the data by a second encryption key and to transmit the related data in a second transmission mode via the input/output interface 16. The data receiving apparatus 20 causes the CPU 22 to decode, by a first encryption key, the data requiring the assurance of a transmission band received in the first transmission mode via an input/output interface 24, and also to decode, by a second encryption key, the related data received in the second transmission mode via the input/output interface 24.
摘要:
In an information processing system and method which enables detection processing of a revoked entity using an enabling key block (EKB), a device or a service provider as a revoked entity is determined on the basis of the enabling key block (EKB) used for key distribution in a tree structure. ID which enables position identification in the hierarchical key distribution tree is stored in a public key certificate and tracing processing using a tag of the enabling key block (EKB) is executed on the basis of the ID acquired from the public key certificate, thus determining whether or not the ID is of a position where EKB processing (decryption) is possible and determining the presence/absence of revocation of an entity corresponding to the ID.
摘要:
An enabling key block (EKB) used in an encrypted key distributing tree structure is generated by forming a simplified 2-branch or multi-branch type tree with a terminal node or leaf which is capable of decrypting on the basis of a key corresponding to a node or a leaf of the simplified tree. Further, the EKB includes a tag for indicating a position of an encrypted key in the tree. The tag not only discriminates position but also stores data for judging the presence of encrypted key data within the EKB. As such, a considerable reduction in data quantity is realized, and the decrypting process in a device is also simplified.
摘要:
A method for shifting a key agreement status in a public-key cryptographic protocol that allows key agreement between three devices includes the steps of, under condition that allow key agreement between three devices including a first device, a second device, and a dummy device, reaching key agreement between the first device and the second device, and replacing the dummy device with a third device, thereby shifting from two-device key agreement to three-device key agreement.
摘要:
An information processing method, decrypting method, information processing apparatus, and computer program are provided. An information processing method generates a hierarchical tree used to provide a ciphertext decryptable only by a specific selected device through broadcast encryption. The method includes the steps of generating a unidirectional hierarchical tree including nodes having respective node associated values, the node associated value of each of the nodes being calculatable by a function using the node associated value and a node attached variable of at least one lower node; setting an intermediate label allowing calculation of values of labels associated with a special subset selected from labels of subsets defined based on a subset difference method; generating labels of the special subset by a calculation based on the intermediate label, and generating labels not associated with the special subset by a calculation based on the labels generated; and determining labels to be provided to a receiver associated with a terminal node of the hierarchical tree.