摘要:
An encrypted content playback apparatus and a playback method suitable for content playback from a medium in which both content that is subject to conventional copy protection and content to which DRAM is applied exists, and a recording medium on which data used in the playback apparatus and the playback method is stored are disclosed. The medium stores information indicating, for each content, whether the content is content subject to conventional copy protection or content to which DRAM is applied. Based on this information, a playback apparatus determines the key to use to decrypt the content.
摘要:
An encrypted content playback apparatus and a playback method are suitable for content playback from a recording medium having stored thereon both content that is subject to conventional copy protection and content to which DRAM is applied. The recording medium stores information indicating, for each content, whether the content is content subject to conventional copy protection or content to which DRAM is applied. Based on this information, the playback apparatus determines the key to use to decrypt the content.
摘要:
The object of the present invention is to provide a reproduction apparatus that is capable of preventing personal information of users from being transmitted to an external apparatus that is under management of a malicious person.The reproduction apparatus uses a revocation list and a valid-content list in combination in order to prevent transmission of personal information of users. It is possible to prevent transmission of personal information by revoking certificates to be revoked because of being exposed or hacked at a certain timing, by listing them in the revocation list. Meanwhile, it is possible to allow use of contents that have been manufactured before the exposure, by listing them in the valid-content list. Accordingly, it is possible to realize both the security and the user convenience at the same time.
摘要:
A virtual machine can be implemented by anyone because the interface and other information necessary for implementation are publicly available. Hence, if virtual machine is implemented maliciously, a program operating thereon can be made to operate maliciously instead of operating legitimately. By comparing secret information held in memory and specific to the virtual machine with verification information which a program holds itself, the program verifies that the virtual machine on which it is running has been legitimately implemented and excludes illegitimate virtual machines.
摘要:
To provide a content playback device capable of protecting content according to DRM, when decrypting encrypted content recorded on a recording medium and playing the decrypted content. If key generation information is “00”, a key control unit 104 concatenates a decrypted media key and content information in this order, and applies a one-way function to the concatenation result to generate a content key. If the key generation information is “10”, the key control unit 104 sets a rights key as the content key. If the key generation information is “01”, the key control unit 104 concatenates the decrypted media key and the rights key in this order, and applies a one-way function to the concatenation result to generate the content key.
摘要:
A virtual machine can be implemented by anyone because the interface and other information necessary for implementation are publicly available. Therefore, it is possible that by implementing the virtual machine illegitimately, programs run thereon on will be made to operate illegitimately instead of legitimately. A program compares secret information held by the virtual machine with verification information held by the program itself. The program thereby verifies whether the virtual machine that runs the program is implemented legitimately, and is able to reject an illegitimate virtual machine.
摘要:
To provide a content playback device capable of protecting content according to DRM, when decrypting encrypted content recorded on a recording medium and playing the decrypted content. If key generation information is “00”, a key control unit 104 concatenates a decrypted media key and content information in this order, and applies a one-way function to the concatenation result to generate a content key. If the key generation information is “10”, the key control unit 104 sets a rights key as the content key. If the key generation information is “01”, the key control unit 104 concatenates the decrypted media key and the rights key in this order, and applies a one-way function to the concatenation result to generate the content key.
摘要:
A virtual machine can be implemented by anyone because the interface and other information necessary for implementation are publicly available. Hence, if virtual machine is implemented maliciously, a program operating thereon can be made to operate maliciously instead of operating legitimately.By comparing secret information held in memory and specific to the virtual machine with verification information which a program holds itself, the program verifies that the virtual machine on which it is running has been legitimately implemented and excludes illegitimate virtual machines.
摘要:
To provide a content playback device capable of protecting content according to DRM, when decrypting encrypted content recorded on a recording medium and playing the decrypted content. If key generation information is “00”, a key control unit 104 concatenates a decrypted media key and content information in this order, and applies a one-way function to the concatenation result to generate a content key. If the key generation information is “10”, the key control unit 104 sets a rights key as the content key. If the key generation information is “01”, the key control unit 104 concatenates the decrypted media key and the rights key in this order, and applies a one-way function to the concatenation result to generate the content key.
摘要:
A virtual machine can be implemented by anyone because the interface and other information necessary for implementation are publicly available. Therefore, it is possible that by implementing the virtual machine illegitimately, programs run thereon on will be made to operate illegitimately instead of legitimately. A program compares secret information held by the virtual machine with verification information held by the program itself. The program thereby verifies whether the virtual machine that runs the program is implemented legitimately, and is able to reject an illegitimate virtual machine.