摘要:
A cipher key is generated by first information shared in secrete between a data transmitting unit 10 and a data receiving unit 20, second information derived from duplication control information of transmit data and third information which is time change information shared between the data transmitting unit and the data receiving unit to cipher data by a CPU 12 by using the above-mentioned cipher key to transmit, from the data transmitting unit 10 to the data receiving unit 20, transmit data in which the duplication control information and the time change information are added to the ciphered data.
摘要:
A 4-byte LBA (logical block address) specified in a read command is supplied to first and second IV (initialization vector) generation units. The initialization-vector generation units each extend the LBA to data with a size of 16 bytes by applying typically a hash function to the LBA. The first initialization-vector generation unit outputs the data with a size of 16 bytes to an encryption unit as an initialization vector IV. On the other hand, the second initialization-vector generation unit outputs the data with a size of 16 bytes to a decryption unit as an initialization vector IV. The encryption unit encrypts input data by using the initialization vector IV and a session key Ks received from a first authentication-processing unit. On the other hand, the decryption unit decrypts input data by using the initialization vector IV and the session key Ks received from a second authentication-processing unit. In this way, data can be encrypted and decrypted by using the initialization vector IV. The present invention can be applied to a personal computer and a drive, which exchange data with each other by way of a predetermined interface.
摘要:
An information processing apparatus and an information processing method are capable of preventing information from being copied illegally. To put it in detail, a hash function and a service key are stored in advance in an EEPROM of a DVD player serving as a source. In an EEPROM of a personal computer (PC) serving as a sink, on the other hand, its ID and a license key are stored beforehand. The DVD player requests the PC to transmit the ID. The DVD player then applies the hash function to data resulting from concatenation of the ID with the service key to generate a license key (=hash (ID ∥ service-key)). Subsequently, the DVD player generates a source side common session key and encrypts the session key by using the generated license key. Then, the DVD player transmits the encrypted source side common session key to the PC. The PC decrypts the encrypted source side common session key by using the license key stored in its EEPROM to produce a sink side common session key which has a value equal to that of the source side common session key.
摘要:
Coded information can be utilized by devices other than a device supplied with information while preventing a dishonest use of the information, mutual recognizing part 17 mutually recognizes the IC card 4. The coding part 15 codes a key for contents with a key for movement. The recording part 12 records coded contents and the key for contents coded by the coding part 15 on the optical disc 5.
摘要:
Contents data that have been enciphered and transmitted are recorded as they are on a recording medium, and the contents key used to encipher these data is enciphered in a way used in this recording system and is recorded on the medium. Moreover, a step is taken to ensure that fine trick plays can be performed. In recording contents data that have been enciphered and transmitted, the contents data themselves are recorded in the enciphered state on the recording medium. However, the contents data are decoded by a contents data decoding circuit 46, and a map file containing necessary management information for reproduction is created by a map file creating circuit 47 and this file is recorded together with the contents data.
摘要:
There is provided an analysis server including a first verifying unit that analyzes data acquired from a local power management system composed of an electronic appliance provided with a sensor and a power management apparatus managing power supply to the electronic appliance connected to a power network, by using history information of the local power management system or data acquired from another local power management system with a power usage state similar to that of the local power management system, a second verifying unit that analyzes the data acquired from the local power management system, by using an estimated value calculated by simulation using characteristics information and/or specification information of the electronic appliance, and a control unit that controls the first verifying unit and the second verifying unit.
摘要:
A cipher key is generated by first information shared in secrete between a data transmitting unit 10 and a data receiving unit 20, second information derived from duplication control information of transmit data and third information which is time change information shared between the data transmitting unit and the data receiving unit to cipher data by a CPU 12 by using the above-mentioned cipher key to transmit, from the data transmitting unit 10 to the data receiving unit 20, transmit data in which the duplication control information and the time change information are added to the ciphered data.
摘要:
Provided is a method where a power management apparatus (a) acquires, from a server managed by a manufacturer of an electronic appliance, a public key paired with a secret key that the electronic appliance and the server hold, (b) generates a ciphertext by generating a random number and encrypting the random number by the public key, and (c) transmits the ciphertext to the electronic appliance and the server, where the electronic appliance (d) restores the random number by decrypting the ciphertext transmitted in (c), (e) causes an electrical part to operate, based on the random number, and (f) transmits to the server the value of current flowing through the electrical part, and where the server (g) restores the random number by decrypting the ciphertext transmitted in (c), (h) calculates the value of current to flow through the electrical part based on the random number, and (i) compares values of current.
摘要:
The invention provides an enciphering apparatus and method, a deciphering apparatus and method and an information processing apparatus and method by which illegal copying can be prevented with certainty. Data enciphered by a 1394 interface of a DVD player is transmitted to a personal computer and a magneto-optical disk apparatus through a 1394 bus. In the magneto-optical disk apparatus with which a change to a function is open to a user, the received data is deciphered by a 1394 interface. In contrast, in the personal computer with which a change to a function is open to a user, the enciphered data is deciphered using a time variable key by a 1394 interface, and a result of the decipherment is further deciphered using a session key by an application section.
摘要:
A block key to encrypt block data is generated using an ATS (arrival time stamp) appended to each of TS (transport stream) packets included in a transport stream correspondingly to the arrival time of the TS packet. The ATS is a random data depending upon an arrival time, and so a block-unique key can be generated, which enhances the protection against data cryptanalysis. A block key is generated from a combination of an ATS with a key unique to a device, recording medium or the like such as a master key, disc-unique key, title-unique key or the like. Since an ATS is used to generate a block key, any area for storage of an encryption key for each block may not be provided in a recording medium.