摘要:
An MKB and a device key 121 of a drive are input to a process MKB 122. The process MKB 122 performs a revoking process for the drive. A process MKB 132 performs a revoking process for a host 103. The host 103 compares MAC values calculated by MAC calculating blocks 123 and 133. When the host 103 has determined that the two values are the same, the host 103 has successfully authenticated the drive 102. The drive 102 compares MAC values calculated by MAC calculating blocks 134 and 124 of the host 103. When the drive 102 has determined that the two values are the same, the drive 102 has successfully authenticated the host 103. When the mutual authentication has been successfully performed, the MAC calculating blocks 125 and 135 generate a common session key.
摘要:
A configuration is provided wherein usage restrictions of an application are determined in accordance with timestamps. A certificate revocation list (CRL) in which the revocation information of a content owner who is a providing entity of an application program recorded in a disc is recorded is referred to verify whether or not a content owner identifier recorded in an application certificate is included in the CRL, and in the case that the content owner identifier is included in the CRL, comparison between a timestamp stored in a content certificate and a CRL timestamp is executed, and in the case that the content certificate timestamp has date data equal to or later than the CRL timestamp, utilization processing of the application program is prohibited or restricted. According to the present configuration, a configuration is realized wherein an unrevoked application is not subjected to utilization restriction, and only a revoked application is subjected to utilization restriction.
摘要:
An information processing apparatus includes a data processing unit that verifies data recorded on a disk and reproduces content recorded on the disk if a verification condition is satisfied. The data processing unit verifies the validity of an ID inserter that has recorded, on the disk, an ID corresponding to the disk. The data processing unit acquires an ID inserter certificate containing an apparatus ID of the ID inserter that has recorded the ID corresponding to the disk on the disk and an ID inserter blacklist having apparatus IDs of invoked ID inserters registered therein, determines whether the apparatus ID contained in the ID inserter certificate is registered in the ID inserter blacklist so as to verify the validity of the ID inserter that has recorded the ID corresponding to the disk, and stops reproduction of the content if it is determined that the ID inserter is not valid.
摘要:
An information processing apparatus for controlling use of a content recorded on a disc. The information processing apparatus includes: in reference to a certificate revocation list including invalidation information of a content owner providing the content, a data verification section verifying whether content-owner identification recorded in a content-owner certificate recorded on the disc as a certificate corresponding to the content owner is included in the certificate revocation list, and if included, the data verification section comparing a content-certificate time stamp which is stored in the content certificate recorded on the disc as a certificate corresponding to the content and a CRL time stamp which is invalidation date-and-time information corresponding to the content owner stored in the certificate revocation list; and a content-use control section prohibiting or restricting use of the content if the content-certificate time stamp has date-and-time data not earlier than the CRL time stamp.
摘要:
A signal processing system includes a reproducing apparatus for reading information from a recording medium having unique information and an information processing apparatus for mutually authenticating and connecting the reproducing apparatus. The reproducing apparatus includes a final encryption key generating portion that generates a content information encryption key in accordance with intermediate key information. A first transmitting portion transmits the intermediate key information to the information processing apparatus. A second transmitting portion transmits the content information encryption key to the information processing apparatus. The information processing apparatus includes a content information encrypting portion that encrypts content information using the content information encryption key, and an intermediate key information encrypting portion that encrypts the intermediate key information using key information unique to the recording medium. A recording portion records the encrypted content information and the encrypted intermediate key information to the recording medium.
摘要:
A configuration is provided wherein usage restrictions of an application are determined in accordance with timestamps. A certificate revocation list (CRL) in which the revocation information of a content owner who is a providing entity of an application program recorded in a disc is recorded is referred to verify whether or not a content owner identifier recorded in an application certificate is included in the CRL, and in the case that the content owner identifier is included in the CRL, comparison between a timestamp stored in a content certificate and a CRL timestamp is executed, and in the case that the content certificate timestamp has date data equal to or later than the CRL timestamp, utilization processing of the application program is prohibited or restricted. According to the present configuration, a configuration is realized wherein an unrevoked application is not subjected to utilization restriction, and only a revoked application is subjected to utilization restriction.
摘要:
A configuration is provided which improves scrambling processing of content and eliminates unauthorized use of content. Scramble rules which differ for each content are used for content scrambling processing. For example, in the event of using shuffling processing, various shuffle states are specified as scramble rules. In the event of using Exclusive-OR processing, a value applicable to EXOR is specified as the scramble rule. Also, in the event of using rotation processing, a shift amount is specified as the scramble rule. In the event of using 32 shuffle elements in shuffling processing, 32! different shuffle states, that is to say, 32! different scramble rules can be specified. Also, the values for EXOR or the rotation shift amount can be set as various values, and many scramble rules can be set.
摘要:
A configuration is provided which improves scrambling processing of content and eliminates unauthorized use of content. Scramble rules which differ for each content are used for content scrambling processing. For example, in the event of using shuffling processing, various shuffle states are specified as scramble rules. In the event of using Exclusive-OR processing, a value applicable to EXOR is specified as the scramble rule. Also, in the event of using rotation processing, a shift amount is specified as the scramble rule. In the event of using 32 shuffle elements in shuffling processing, 32! different shuffle states, that is to say, 32! different scramble rules can be specified. Also, the values for EXOR or the rotation shift amount can be set as various values, and many scramble rules can be set.
摘要:
In a process for manufacturing an information recording medium, a configuration is provided in which strict information management and an information recording medium manufacturing process are realized. In a configuration in which master data as original data of recording data for an information recording medium is generated and recording data for the information recording medium is generated on the basis of the master data, master data containing a dummy data area in a partial area of the master data is generated, and the dummy data area is identified and a process for setting significant information is performed on the basis of the stored information of an auxiliary file. Therefore, it is not necessary to obtain data of significant information when the master data is to be generated, and it becomes possible to generate the master data without obtaining specific information, such as an encrypted key block.
摘要:
A configuration for preventing information leakage in content use involving data transfer between different devices and illegal content processing is provided. In a content reproduction or recording process involving data transfer between different devices, such as a drive and a host, a media ID (disc ID) used for a content encryption or decryption process is read from a medium. The drive verifies whether the media ID has been recorded in such a manner as to correspond to a header code set on a correct valid medium. When the medium is confirmed to be a valid medium by the verification, on the drive side, the media ID is encrypted and output to the host. With this configuration outside leakage of the media ID, and a content reproduction or recording process using an invalid medium can be prevented.