Authentication system and key registration apparatus
    2.
    发明授权
    Authentication system and key registration apparatus 失效
    认证系统和密钥登记设备

    公开(公告)号:US07296147B2

    公开(公告)日:2007-11-13

    申请号:US10454531

    申请日:2003-06-05

    IPC分类号: H04L9/00 H04K1/00 G06K9/00

    摘要: In an authentication system, a key registration apparatus receives input of an identifier unique to a second device, generates first key data from the identifier according to a predetermined key generation algorithm, and transmits the generated first key data to a first device, which receives and stores the first key data, and authenticates the second device with use of the first key data. The second device stores in advance second key data generated from the identifier according to the predetermined key generation algorithm, and is authenticated by the first device with use of the second key data. Accordingly, the first and second devices cannot be registered without using the key registration apparatus, thereby preventing communication with unregistered devices. This enables usage of content to be limited to individual usage in the home of a user, and can be realized even with devices that are not connected outside the home.

    摘要翻译: 在认证系统中,密钥注册装置接收对第二装置唯一的标识符的输入,根据预定的密钥生成算法从标识符生成第一密钥数据,并将生成的第一密钥数据发送到第一装置, 存储第一密钥数据,并使用第一密钥数据认证第二设备。 第二设备预先存储根据预定密钥生成算法从标识符生成的第二密钥数据,并且通过第二密钥数据由第一设备认证。 因此,在不使用密钥登记装置的情况下,不能登记第一和第二装置,从而防止与未登记装置的通信。 这使得内容的使用被限制在用户的家庭中的个人使用,并且即使使用不在家外的设备也可以实现。

    Content protection system, key data generation apparatus, and terminal apparatus
    3.
    发明授权
    Content protection system, key data generation apparatus, and terminal apparatus 有权
    内容保护系统,密钥数据生成装置和终端装置

    公开(公告)号:US08144869B2

    公开(公告)日:2012-03-27

    申请号:US12112670

    申请日:2008-04-30

    IPC分类号: H04N7/167

    摘要: A content protection system prevents illegal key acquisition, without checking uniqueness of device keys. The content protection system includes a key data generation apparatus and a user terminal. The key data generation apparatus converts first key data, which is for using content, based on a predetermined conversion rule, thereby generating second key data, encrypts the second key data using a device key held by valid terminals, and outputs the encrypted key data. The user terminal obtains the encrypted key data, decrypts the encrypted key data using a device key held by the user terminal, thereby generating second key data, converts the second key data based on a re-conversion rule corresponding to the conversion rule, thereby generating the first key data, and uses the content with use of the generated first key data.

    摘要翻译: 内容保护系统防止非法密钥获取,而不会检查设备密钥的唯一性。 内容保护系统包括密钥数据生成装置和用户终端。 密钥数据生成装置基于预定的转换规则,对使用内容的第一密钥数据进行转换,从而生成第二密钥数据,使用由有效终端保持的装置密钥对第二密钥数据进行加密,并输出加密的密钥数据。 用户终端获取加密的密钥数据,使用由用户终端保存的设备密钥解密加密的密钥数据,从而生成第二密钥数据,并根据与转换规则对应的重新转换规则转换第二密钥数据,从而生成 第一密钥数据,并使用所生成的第一密钥数据的内容。

    Pay information providing system for descrambling information from plural sources and rescrambling the information before sending to a terminal or terminals
    4.
    发明授权
    Pay information providing system for descrambling information from plural sources and rescrambling the information before sending to a terminal or terminals 失效
    用于从多个源解扰信息的付费信息提供系统,并且在发送到终端之前对该信息进行解扰

    公开(公告)号:US06289314B1

    公开(公告)日:2001-09-11

    申请号:US08929652

    申请日:1997-09-16

    IPC分类号: G06F1760

    摘要: A server scrambles received pay information in an internal scrambler and then transmits the result to a terminal which sent a request. A second charge managing portion determines a charge for the pay information for billing a contractor who manages the server, based on a coefficient of charge outputted from a terminal managing portion. The coefficient of charge is determined based on attributes of the terminal that uses the pay information, the number of the terminals which use the pay information, attributes of users who use the terminals, etc. The charge of use can thereby be obtained according to a degree of actual use at a users' side.

    摘要翻译: 服务器在内部扰频器中加扰收到的付费信息,然后将结果发送给发送请求的终端。 第二费用管理部分基于从终端管理部分输出的费用系数来确定用于计费管理服务器的承包商的付费信息的费用。 费用系数是基于使用付费信息的终端的属性,使用付费信息的终端的数量,使用终端的用户的属性等来确定的。因此,可以根据 在用户方的实际使用程度。

    Block cipher using key data merged with an intermediate block generated from a previous block
    5.
    发明授权
    Block cipher using key data merged with an intermediate block generated from a previous block 失效
    使用与从先前块生成的中间块合并的密钥数据的块密码

    公开(公告)号:US06459792B2

    公开(公告)日:2002-10-01

    申请号:US09064469

    申请日:1998-04-22

    IPC分类号: H04L937

    摘要: A cryptographic processing apparatus for performing cryptographic processing using input data to generate output data is provided. The cryptographic processing apparatus includes a storage unit for storing chain data which is used for reflecting present cryptographic processing on next cryptographic processing, and for renewing the chain data each time cryptographic processing is performed, a merging unit for merging the chain data stored in the storage unit with the input data to generate merged data, and a main cryptographic processing unit for performing main cryptographic processing using the merged data to generate output data and for outputting intermediate data generated during a generation of the output data, wherein the storage unit renews the chain data by storing the intermediate data outputted by the main cryptographic processing unit as the new chain data, which is used for the next cryptographic processing.

    摘要翻译: 提供一种使用输入数据进行密码处理以产生输出数据的密码处理装置。 密码处理装置包括存储单元,用于存储链数据,用于反映当前密码处理对下一密码处理的处理,并且每次执行密码处理时更新链数据;合并单元,用于合并存储在存储器中的链数据 具有用于生成合并数据的输入数据的单元,以及主密码处理单元,用于使用合并数据执行主密码处理,以生成输出数据并输出在生成输出数据期间生成的中间数据,其中存储单元更新链 数据通过存储由主密码处理单元输出的中间数据作为用于下一个密码处理的新链接数据。

    DATA PROTECTION SYSTEM THAT PROTECTS DATA BY ENCRYPTING THE DATA

    公开(公告)号:US20100034388A1

    公开(公告)日:2010-02-11

    申请号:US12104165

    申请日:2008-04-16

    IPC分类号: H04L9/00 G06F7/04

    摘要: A data protection system is provided that reduces, to a degree, the amount of encrypted data that is distributed to a plurality of terminals. In the data protection system a terminal whose decryption keys are exposed by a dishonest party is made to be unable to decrypt the data correctly, while other terminals are able to decrypt the data correctly.The data protection system includes a plurality of terminals, and an encryption device that encrypts distribution data distributed to each terminal. Each terminal is corresponded with one node on a lowest level of a 4-ary tree structure or the like having a plurality of hierarchies. The data protection system, for each node in the tree structure, excluding those on the lowest level, determines a plurality of combination patterns that include combinations of two or more of all four nodes that are reached one level below the node, decides an individual decryption key for each determined combination pattern, and decides an individual decryption key for each node on the lowest level. Further, the data protection system has each terminal store all decryption keys decided for the nodes on the path from the node on the lowest level that corresponds to the terminal through to the node on the highest level. The data protection system prescribes nodes that are reached from the node on the lowest level that corresponds to the terminal through to the node on the highest level that correspond to a terminal that has been dishonestly analyzed as invalid nodes. For invalid nodes, other than invalid nodes on the lowest level, the data protection system designates an encryption key that corresponds to the decryption key decided in correspondence with the combination pattern that combines all nodes, excluding invalid nodes, of the four nodes that are reached one level below the node, and has the encryption device encrypt distribution data that uses each of the designated encryption keys.

    Data protection system that protects data by encrypting the data

    公开(公告)号:US07395425B2

    公开(公告)日:2008-07-01

    申请号:US10297089

    申请日:2002-03-28

    摘要: A data protection system is provided that reduces, to a degree, the amount of encrypted data that is distributed to a plurality of terminals. In the data protection system a terminal whose decryption keys are exposed by a dishonest party is made to be unable to decrypt the data correctly, while other terminals are able to decrypt the data correctly.The data protection system includes a plurality of terminals, and an encryption device that encrypts distribution data distributed to each terminal. Each terminal is corresponded with one node on a lowest level of a 4-ary tree structure or the like having a plurality of hierarchies. The data protection system, for each node in the tree structure, excluding those on the lowest level, determines a plurality of combination patterns that include combinations of two or more of all four nodes that are reached one level below the node, decides an individual decryption key for each determined combination pattern, and decides an individual decryption key for each node on the lowest level. Further, the data protection system has each terminal store all decryption keys decided for the nodes on the path from the node on the lowest level that corresponds to the terminal through to the node on the highest level. The data protection system prescribes nodes that are reached from the node on the lowest level that corresponds to the terminal through to the node on the highest level that correspond to a terminal that has been dishonestly analyzed as invalid nodes. For invalid nodes, other than invalid nodes on the lowest level, the data protection system designates an encryption key that corresponds to the decryption key decided in correspondence with the combination pattern that combines all nodes, excluding invalid nodes, of the four nodes that are reached one level below the node, and has the encryption device encrypt distribution data that uses each of the designated encryption keys.