摘要:
A data processing apparatus includes an encrypting apparatus for encrypting data in units of an encryption block having a predetermined data length. A processing apparatus is also provided for performing predetermined processing on data in units of a processing block having a data length of a whole multiple of the predetermined length of the encryption block. A controller is also provided for writing the encrypted data in a storage medium so that the data positioned in the same encryption block is also positioned in the same processing block. The controller also reads the data from the storage means in units of the processing block when the data is to be read out.
摘要:
The present invention provides a data processing method and apparatus capable of shortening the processing time required when editing previously encrypted track data. An example of a transfer of audio track data between a portable player and a storage device is provided. The track data is comprised of one or more parts, each of which in turn is comprised of a series of data blocks. Each block of the track data is encrypted prior to transfer using a block key. The block keys are determined in such a manner that subsequent editing of the track data which results in redistribution of the parts does not require full decryption of the data.
摘要:
A storage unit in a first mutual identification unit stores master key data and a second storage unit in a second mutual identification unit stores identification key data. A random number generating unit generates a number that is used to select a master key and a corresponding identification key at the mutual identification units. The first mutual identification unit generates an estimate of the selected identification key using the selected master key and uses this estimate as a common key when performing mutual identification with the second mutual identification unit.
摘要:
A configuration is provided wherein usage restrictions of an application are determined in accordance with timestamps. A certificate revocation list (CRL) in which the revocation information of a content owner who is a providing entity of an application program recorded in a disc is recorded is referred to verify whether or not a content owner identifier recorded in an application certificate is included in the CRL, and in the case that the content owner identifier is included in the CRL, comparison between a timestamp stored in a content certificate and a CRL timestamp is executed, and in the case that the content certificate timestamp has date data equal to or later than the CRL timestamp, utilization processing of the application program is prohibited or restricted. According to the present configuration, a configuration is realized wherein an unrevoked application is not subjected to utilization restriction, and only a revoked application is subjected to utilization restriction.
摘要:
To provide an apparatus, a recording medium and a method for effectively preventing unauthorized use of a content. A content containing broken data different from correct content member data is recorded on an information recording medium. Furthermore, transform data, as the correct member data, to be substituted for the broken data, and a fix-up table storing setting position information of the content are recorded on the information recording medium. During the content playback process, the transform data is substituted for the content member data in accordance with the fix-up table recorded on the information recording medium. With this arrangement, even if the encryption key corresponding to the encrypted content recorded on the information recording medium is leaked, an apparatus unable to acquire the transform data cannot play back the content. Unauthorized use of the content is thus controlled.
摘要:
An information processing apparatus includes: a data processing unit which performs copy processing for recording recorded data of a first medium in a second medium, wherein the data processing unit receives three-dimensional image restriction information as copy restriction information of a three-dimensional image from a management server, and when a three-dimensional image is included in copy data from the first medium, performs processing for referencing the three-dimensional image restriction information, determining whether or not the copy processing is permitted, and copying recorded data of the first medium to the second medium under the condition it is determined that the copy processing is permitted.
摘要:
An enabling key block (EKB) used in an encrypted key distributing tree structure is generated by forming a simplified 2-branch or multi-branch type tree with a terminal node or leaf which is capable of decrypting on the basis of a key corresponding to a node or a leaf of the simplified tree. Further, the EKB includes a tag for indicating a position of an encrypted key in the tree. The tag not only discriminates position but also stores data for judging the presence of encrypted key data within the EKB. As such, a considerable reduction in data quantity is realized, and the decrypting process in a device is also simplified.
摘要:
An information processing system and method are disclosed in which information processing is performed in a highly efficient manner using an enabling key block (EKB) on the basis of a tree structure including category subtrees. A key tree is formed so as to include a plurality of subtrees serving as category trees categorized in accordance with categories and managed by category entities. An EKB includes data produced by selecting a path in a tree and encrypting a higher-level key in the selected path using a lower-level key in the selected path. The resultant EKB is provided to a device. Distribution of EKB's is managed on the basis of an EKB type definition list representing the correspondence between an EKB type identifier and one or more identification data identifying one or more category trees that can process an EKB of an EKB type specified by the EKB type identifier.
摘要:
A configuration is provided which improves scrambling processing of content and eliminates unauthorized use of content. Scramble rules which differ for each content are used for content scrambling processing. For example, in the event of using shuffling processing, various shuffle states are specified as scramble rules. In the event of using Exclusive-OR processing, a value applicable to EXOR is specified as the scramble rule. Also, in the event of using rotation processing, a shift amount is specified as the scramble rule. In the event of using 32 shuffle elements in shuffling processing, 32! different shuffle states, that is to say, 32! different scramble rules can be specified. Also, the values for EXOR or the rotation shift amount can be set as various values, and many scramble rules can be set.
摘要:
An information processing system and method are disclosed in which information processing is performed in a highly efficient manner using an enabling key block (EKB) on the basis of a tree structure including category subtrees. A key tree is produced so as to include a plurality of subtrees that are grouped in accordance with categories and managed by category entities. An EKB is produced so as to include data produced by selecting a path in the key tree and encrypting an upper-level key in the selected path using a lower-level key in the selected path. The resultant EKB is provided to a device. If a change occurs in state of a category tree capable of processing an EKB identified in the EKB type definition list, a notification of the change in state is sent to an entity that uses the EKB thereby making it possible for an EKB requester to perform processing in accordance with a newest EKB.