摘要:
A GUID as title information and a global serial number are recorded in a BCA of a digital video disc 60. A hash value of the GUID is embedded as an electronic watermark in a data area 64. When content data is reproduced from the digital video disc 60, a match of information of the two GUIDs is checked so as to prevent the digital video disc 60 from being illegally copied. A lead-in area 63 and a managing organization 20 provide disc revocation lists. With a global serial number and a disc revocation list, content data can be prevented from being reproduced from an illegally distributed disc. A film WM detector 84 detects data embedded in a movie shown in a theater so as to prevent content data from being reproduced from a disc on which the embedded data is recorded. Thus, content data can be prevented from being reproduced from an illegally distributed disc before a copyright supervisor of the content authorizes the disc to be distributed.
摘要:
A list of video fingerprinting data that represents a feature of the newest video content is extracted from a digital video disc 160 or provided by a copyright supervisor authorized by a managing organization. The list of the video fingerprinting data is recorded in a non-volatile memory 181. When video content is reproduced from the digital video disc 160, a fingerprinting data calculating portion 187 extracts the feature of the video content and obtains video fingerprinting data. When the data is contained in the list, the reproduction for the video content is restricted. Thus, the reproduction for an illegal digital video disc 160 can be restricted until the copyright supervisor permits the reproduction for the digital video disc 160.
摘要:
An MKB and a device key 121 of a drive are input to a process MKB 122. The process MKB 122 performs a revoking process for the drive. A process MKB 132 performs a revoking process for a host 103. The host 103 compares MAC values calculated by MAC calculating blocks 123 and 133. When the host 103 has determined that the two values are the same, the host 103 has successfully authenticated the drive 102. The drive 102 compares MAC values calculated by MAC calculating blocks 134 and 124 of the host 103. When the drive 102 has determined that the two values are the same, the drive 102 has successfully authenticated the host 103. When the mutual authentication has been successfully performed, the MAC calculating blocks 125 and 135 generate a common session key.
摘要:
An information processing apparatus includes a data processing unit that verifies data recorded on a disk and reproduces content recorded on the disk if a verification condition is satisfied. The data processing unit verifies the validity of an ID inserter that has recorded, on the disk, an ID corresponding to the disk. The data processing unit acquires an ID inserter certificate containing an apparatus ID of the ID inserter that has recorded the ID corresponding to the disk on the disk and an ID inserter blacklist having apparatus IDs of invoked ID inserters registered therein, determines whether the apparatus ID contained in the ID inserter certificate is registered in the ID inserter blacklist so as to verify the validity of the ID inserter that has recorded the ID corresponding to the disk, and stops reproduction of the content if it is determined that the ID inserter is not valid.
摘要:
An information processing apparatus for controlling use of a content recorded on a disc. The information processing apparatus includes: in reference to a certificate revocation list including invalidation information of a content owner providing the content, a data verification section verifying whether content-owner identification recorded in a content-owner certificate recorded on the disc as a certificate corresponding to the content owner is included in the certificate revocation list, and if included, the data verification section comparing a content-certificate time stamp which is stored in the content certificate recorded on the disc as a certificate corresponding to the content and a CRL time stamp which is invalidation date-and-time information corresponding to the content owner stored in the certificate revocation list; and a content-use control section prohibiting or restricting use of the content if the content-certificate time stamp has date-and-time data not earlier than the CRL time stamp.
摘要:
An information processing apparatus includes a data processing unit configured to perform data processing on data read from a data recordable disc. The data processing unit performs a physical mark verification process for verifying whether or not a physical mark that is identification data unique to each of mother discs used when the disc was manufactured has been recorded on the disc, and a signature verification process for obtaining, from the disc, a token containing an electronic signature generated on the basis of a medium ID that is an identifier unique to each disc by a content providing server that provided the recorded content of the disc and for performing signature verification, and reproduces recorded content of the disc under a condition in which the recording of a physical mark in the physical mark verification process has been confirmed and signature verification in the signature verification process holds true.
摘要:
A virtual machine can be implemented by anyone because the interface and other information necessary for implementation are publicly available. Therefore, it is possible that by implementing the virtual machine illegitimately, programs run thereon on will be made to operate illegitimately instead of legitimately. A program compares secret information held by the virtual machine with verification information held by the program itself. The program thereby verifies whether the virtual machine that runs the program is implemented legitimately, and is able to reject an illegitimate virtual machine.
摘要:
A virtual machine can be implemented by anyone because the interface and other information necessary for implementation are publicly available. Therefore, it is possible that by implementing the virtual machine illegitimately, programs run thereon on will be made to operate illegitimately instead of legitimately. A program compares secret information held by the virtual machine with verification information held by the program itself. The program thereby verifies whether the virtual machine that runs the program is implemented legitimately, and is able to reject an illegitimate virtual machine.
摘要:
A virtual machine can be implemented by anyone because the interface and other information necessary for implementation are publicly available. Hence, if virtual machine is implemented maliciously, a program operating thereon can be made to operate maliciously instead of operating legitimately. By comparing secret information held in memory and specific to the virtual machine with verification information which a program holds itself, the program verifies that the virtual machine on which it is running has been legitimately implemented and excludes illegitimate virtual machines.
摘要:
An information processing system includes: a client executing acquisition and reproduction of contents; a management server providing the client with content selection information applied for acquisition of contents; and a content providing server receiving the content selection information from the client and providing the content selected in accordance with the content selection information, wherein the content selection information includes content identifiers as identifiers of encrypted contents respectively encrypted by different encryption keys and range information indicating data areas of range data which is configuration data of respective encrypted contents, and the content providing server provides the client with an encrypted content formed by combining range data as partial data of the encrypted contents specified by the content identifiers and the range information.