摘要:
A data protection system is provided that reduces, to a degree, the amount of encrypted data that is distributed to a plurality of terminals. In the data protection system a terminal whose decryption keys are exposed by a dishonest party is made to be unable to decrypt the data correctly, while other terminals are able to decrypt the data correctly.The data protection system includes a plurality of terminals, and an encryption device that encrypts distribution data distributed to each terminal. Each terminal is corresponded with one node on a lowest level of a 4-ary tree structure or the like having a plurality of hierarchies. The data protection system, for each node in the tree structure, excluding those on the lowest level, determines a plurality of combination patterns that include combinations of two or more of all four nodes that are reached one level below the node, decides an individual decryption key for each determined combination pattern, and decides an individual decryption key for each node on the lowest level. Further, the data protection system has each terminal store all decryption keys decided for the nodes on the path from the node on the lowest level that corresponds to the terminal through to the node on the highest level. The data protection system prescribes nodes that are reached from the node on the lowest level that corresponds to the terminal through to the node on the highest level that correspond to a terminal that has been dishonestly analyzed as invalid nodes. For invalid nodes, other than invalid nodes on the lowest level, the data protection system designates an encryption key that corresponds to the decryption key decided in correspondence with the combination pattern that combines all nodes, excluding invalid nodes, of the four nodes that are reached one level below the node, and has the encryption device encrypt distribution data that uses each of the designated encryption keys.
摘要:
A copyright protection system includes a recording device and a reproduction device. The recording device writes encrypted content, an encrypted content key for decrypting the encrypted content, and license information on a recording medium on which a unique media number has been recorded in an unrewritable state. The license information is generated using both the media number and the encrypted content key, and therefore reflects both values. The reproduction device reads the media number, the encrypted content key, and the license information from the recording medium, and judges whether the license information reflects both the media number and the encrypted content key. The reproduction device decrypts the encrypted content key, and decrypts the encrypted content using the content key only if the license information reflects both values. Thus, the copyright protection system allows only original recording media to be reproduced, and prohibits reproduction of copy recording media.
摘要:
A secure device is provided that can store programs therein, the secure device including: a low-protection level storage unit; a high-protection level storage unit; a program acquiring unit that acquires a program and corresponding additional information, the additional information used for determining a storage destination of the acquired program; an additional information analyzing unit that stores the acquired program in one of the low-protection level storage unit and the high-protection level storage unit, according to additional information; an area searching unit; a protection level judging unit; and a program storing unit.
摘要:
The verifier apparatus 50 includes a random number generation unit 51 that generates a 2n-bit random number, a separator unit 52 that separates the random number into two sets of n-bit data, a data conversion module 53 that converts one set of separated data using the other set of separated data as a key, and a comparator unit 54 that judges whether the converted result matches claimant data sent back from the claimant apparatus 60. The claimant apparatus 60 includes a separator unit 61 and a data conversion module 62 that have the same functions as the separator unit 52 and the data conversion module 53 in the verifier apparatus 50. The claimant apparatus 60 generates n-bit claimant data from the 2n-bit random number generated by the verifier apparatus 50, and sends the generated claimant data to the verifier apparatus 50.
摘要:
Disclosed is a data encryption apparatus strong to differential cryptanalysis, which is now the most influential cryptanalysis method.According to the data encryption apparatus, input data is divided into N blocks, 1 to N-1 blocks of which is selected by a first selection unit with a block selection key. Then the selected blocks of data is compressed into a single block of data in a first combination unit, and encrypted with a data encryption key in an F-function unit. A second combination unit combines the blocks of data not selected in the first selection unit with the output of the F-function unit by XOR. An output unit outputs N blocks of data arranged in the same order as the initial N blocks, in which the 1 to N-1 blocks selected in the first selection unit are outputted without any change, and the other blocks being the outputs of the second combination unit.
摘要:
A authentic public key of the other party of user in communications is generated using the other party's user information and identification information, and a center's public information. The center doesn't know the user's secret keys, and no secret communication paths are required between the center and the users. The workload of the users is not increased even if a plurality of centers are introduced to prevent possible wrongdoing by the center.
摘要:
A content management server comprises: a first connection detection unit that detects whether or not the content management server is connected with the content-using device; a content management unit that manages the content according to a result of the detection by the first connection detection unit and holds information on how the content-using device controls the use of the content. A content-using device comprises: a second connection detection unit that detects whether or not the content-using device is connected with the content management server; a second selection unit that specifies a method for controlling the use of the content according to a result of the detection by the second connection detection unit; and a content control unit that controls the use of the content according to the method specified by the second selection unit.
摘要:
To aim to provide a monitoring system and a program execution apparatus that are capable of maintaining the security intensity even in the case where an unauthentic install module is invalidated. Install modules included in an apparatus each monitor an install module, which is a monitoring target indicated by a monitoring pattern included therein, as to whether the install module performs malicious operations. An install module that performs malicious operations is invalidated in accordance with an instruction from an update server. The monitoring patterns are restructured by the update server such that the install modules except the invalidated install module are each monitored by at least another one of the install modules. The restructured monitoring patterns are distributed to the install modules except the invalidated install module.
摘要:
Provided is a content management device for protecting a content of a provider. A content management device 800 deletes one or more contents shared with and held by a user of another device. The content management device 800 comprises: a sharing unit 801 configured to distribute the contents to the user and thereby share the contents with the user; and a switching unit 802 configured to switch a method of the deletion to another method according to a time elapsed from the distribution.
摘要:
An encryption apparatus prevents plaintext data from leaking even if accumulated data is analyzed, while preventing the size of encrypted data from increasing. The encryption apparatus encrypts a data piece that is smaller than a unit length and stores management information indicating a used area within an encryption area defined based on the unit length. The used area is an area already used for encryption. When encrypting a new data piece that is smaller than the unit length, the encryption apparatus generates encrypted data by adding the new data piece to an unused area within the encryption area with reference to the management information. The unused area is an area not yet used for encryption. The encryption apparatus updates the management information to include an area for the new data piece into the used area, after generating the encrypted data.