摘要:
A data generating device is capable of preventing unauthorized extraction of plaintext content between decryption processing and digital watermark embedment processing. A content reproducing device obtains restoration information and, in accordance with the restoration information, selectively performs predetermined restoration processing and processing of embedding device unique information, on content data at a position shown by the restoration information.
摘要:
A virtual machine can be implemented by anyone because the interface and other information necessary for implementation are publicly available. Therefore, it is possible that by implementing the virtual machine illegitimately, programs run thereon on will be made to operate illegitimately instead of legitimately. A program compares secret information held by the virtual machine with verification information held by the program itself. The program thereby verifies whether the virtual machine that runs the program is implemented legitimately, and is able to reject an illegitimate virtual machine.
摘要:
To provide a data generating device capable of preventing unauthorized extraction of plaintext content between decryption processing and digital watermark embedment processing. A content reproducing device B102 to which the present invention relates obtains restoration information and, in accordance with the restoration information, selectively performs predetermined restoration processing and processing of embedding device unique information, on content data at a position shown by the restoration information.
摘要:
The present invention provides a recording medium that allows the content provider to control messages. The recording medium is provided by a content provider and records thereon content and a program which is executed at the time of playback of the content by a playback apparatus. The program causes the playback apparatus to execute: an interacting step of interacting with a different program prestored in the playback apparatus and executed at the time of the playback of the content; and an output step of transmitting, to the different program, a message determined according to the result of the interaction. The playback apparatus comprises: a reading unit operable to read the program from the recording medium at the time of the playback of the content; a startup unit operable to start up the read program; an interaction unit operable to interact with the program; and a processing unit operable to receive a message corresponding to result of the interaction from the recording medium and perform a process corresponding to the received message.
摘要:
A recording medium, which is provided by a content provider and allows the content provider to control messages, has recorded thereon content and a program executed at a time of playback of the content by a playback apparatus. The program causing the playback apparatus to interact with a different program prestored in the playback apparatus and executed at the time of the playback of the content and to transmit, to the different program, a message determined according to the result of the interaction. The playback apparatus includes a reading unit reading the program from the recording medium at the time of the playback of the content, a startup unit starting up the read program, an interaction unit interacting with the program, and a processing unit receiving a message corresponding to a result of the interaction from the recording medium and performing a process corresponding to the received message.
摘要:
A virtual machine can be implemented by anyone because the interface and other information necessary for implementation are publicly available. Therefore, it is possible that by implementing the virtual machine illegitimately, programs run thereon on will be made to operate illegitimately instead of legitimately. A program compares secret information held by the virtual machine with verification information held by the program itself. The program thereby verifies whether the virtual machine that runs the program is implemented legitimately, and is able to reject an illegitimate virtual machine.
摘要:
A virtual machine can be implemented by anyone because the interface and other information necessary for implementation are publicly available. Hence, if virtual machine is implemented maliciously, a program operating thereon can be made to operate maliciously instead of operating legitimately. By comparing secret information held in memory and specific to the virtual machine with verification information which a program holds itself, the program verifies that the virtual machine on which it is running has been legitimately implemented and excludes illegitimate virtual machines.
摘要:
Processing load on an executing device for conducting playback is high during the playback of contents since the executing device performs verification of the contents validity in parallel with the contents playback, and therefore the executing device has to be equipped with a highly efficient processor. The present invention reduces the processing load involved in the verification by using, for the verification, only a predetermined number of encrypted units selected randomly from multiple encrypted units constituting encrypted contents recorded on the DVD. In addition, the present invention is capable of improving the accuracy of detecting unauthorized contents to some extent by randomly selecting a predetermined number of encrypted units every time the verification is performed.
摘要:
A data processing device for playing back a digital work reduces the processing load involved in verification by using only a predetermined number of encrypted units selected randomly from multiple encrypted units constituting encrypted contents recorded on a DVD. In addition, the data processing device improves the accuracy of detecting unauthorized contents by randomly selecting a predetermined number of encrypted units every time the verification is performed.
摘要:
Processing load on an executing device for conducting playback is high during the playback of contents since the executing device performs verification of the contents validity in parallel with the contents playback, and therefore the executing device has to be equipped with a highly efficient processor. The present invention reduces the processing load involved in the verification by using, for the verification, only a predetermined number of encrypted units selected randomly from multiple encrypted units consisting encrypted contents recorded on the DVD. In addition, the present invention is capable of improving the accuracy of detecting unauthorized contents to some extent by randomly selecting a predetermined number of encrypted units every time the verification is performed.